We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Intensity Adaptive LSB Method Applying a Revised Matching

by Javad Mohammadi Rad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 27
Year of Publication: 2013
Authors: Javad Mohammadi Rad
10.5120/12240-8468

Javad Mohammadi Rad . Intensity Adaptive LSB Method Applying a Revised Matching. International Journal of Computer Applications. 70, 27 ( May 2013), 20-26. DOI=10.5120/12240-8468

@article{ 10.5120/12240-8468,
author = { Javad Mohammadi Rad },
title = { Intensity Adaptive LSB Method Applying a Revised Matching },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 27 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number27/12240-8468/ },
doi = { 10.5120/12240-8468 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:34:13.570782+05:30
%A Javad Mohammadi Rad
%T Intensity Adaptive LSB Method Applying a Revised Matching
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 27
%P 20-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a new steganographic algorithm in spatial domain. A filtering method selects some color components of pixelsin BMP cover imagesfor embedding according to their Most Significant Bits(MSB) value. The components whose MSB value isgreater than a particular threshold,are qualified and the other ones will be skipped. This mechanism makes the retrieval of embedded message possible. Moreover, a matching technique ensures the most possible closeness of new intensity generated in embedding process to its original value. Performance of proposed method is evaluated by some measures namely MAE, MSE,LMSE,LP-Norm, SNR, PSNR, and NCC according to which, proposed method offers up to 40% better results in some measures compared to two other methods; LSB and SLSB.

References
  1. Rahul Joshi, Lokesh Gagnani, and Salony Pandey, "Image Steganography With LSB," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, no. 1, pp. 228-229, January 2013.
  2. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, and Osamah M. Al-Qershi, "Image Steganography Techniques: An Overview," International Journal of Computer Science and Security (IJCSS), vol. 6, no. 3, pp. 168-187, June 2012.
  3. Rahul Joshi, Lokesh Gagnani, and Salony Pandey, "Image Steganography," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, no. 1, pp. 224-227, January 2013.
  4. Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, "Performance study of common image steganography and steganalysis techniques," Journal of Electronic Imaging, vol. 15, no. 4, p. 041104, December 2006.
  5. P. Mohan Kumar and K. L. Shunmuganathan, "Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate," Information Security Journal, vol. 21, no. 2, pp. 65-70, April 2012.
  6. Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, March 2010.
  7. Stefan Katzenbeisser and Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, 1st ed. , Stefan Katzenbeisser and Fabien A. P. Petitcolas, Eds. Boston, USA: Artech House, 2000.
  8. V. Lokeswara Reddy, A. Subramanyam, and P. Chenna Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats," International Journal of Advanced Networking and Applications (IJANA), vol. 2, no. 5, pp. 868-872, November 2011.
  9. Tayana Morkel, Jan H. P. Eloff, and Martin S. Olivier, "An Overview of Image Steganography," in Proceedings of the ISSA New Knowledge Today Conference, Sandton, South Africa, 2005, pp. 1-11.
  10. Sathiamoorthy Manoharan, "Steganalysis of synthetic low-colour images," in Proceedings of the International Symposium on Information Theory and its Applications (ISITA), Honolulu, Hawaii, USA, 2012, pp. 784-788.
  11. Kaustubh Choudhary, "Properties of images in LSB plane," IOSR Journal of Computer Engineering (IOSRJCE), vol. 3, no. 5, pp. 8-16, August 2012.
  12. Juan J. Roque and Jesus M. Minguet, "SLSB: Improving the Steganographic Algorithm LSB," in Proceedings of the 7th International Workshop on Security in Information Systems (WOSIS), Milan, Italy, 2009, pp. 1-11.
  13. Sorina Dumitrescu, Xiaolin Wu, and Zhe Wang, "Detection of LSB steganography via sample pair analysis," IEEE Transactions on Signal Processing, vol. 51, no. 7, pp. 1995-2007, July 2003.
  14. Andrew D. Ker, "Improved detection of LSB steganography in grayscale images," in Proceedings of 6th International Workshop of Information Hiding, Toronto, Canada, 2004, pp. 97-115.
  15. Juan J. Roque. (2010, October) Steganography Studio 1. 0. 2. Software (Executable Jar File). [Online]. http://sourceforge. net/projects/stegstudio/files
  16. Juan J. Roque. (2010, October) Steganography Studio. [Online]. http://stegstudio. sourceforge. net/bibliography. html
  17. Marten Van Dijk and Frans Willems, "Embedding information in grayscale images," in Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux, Enschede, Netherlands, 2001, pp. 147-154.
  18. Miroslav Goljan, Jessica Fridrich, and Taras Holotyak, "New blind steganalysis and its implications," in Proceedings of the SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, 2006, pp. 1-13.
  19. Saeed Mahmoudpour and Sattar Mirzakuchaki, "Hardware architecture for a message hiding algorithm with novel randomizers," International Journal of Computer Applications (IJCA), vol. 37, no. 7, pp. 46-53, January 2012.
  20. Weiqi Luo, Fangjun Huang, and Jiwu Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010.
  21. Ahmet M. Eskicioglu and Paul S. Fisher, "Image quality measures and their performance," IEEE Transactions on Communications, vol. 43, no. 12, pp. 2959-2965, December 1995.
  22. Yong Seok Heo, Kyoung Mu Lee, and Sang Uk Lee, "Robust stereo matching using adaptive normalized cross-correlation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 4, pp. 807-822, April 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Filtering Intensity Adaptive LSB (IALSB) LSB Matching LSB Plane LSBSteganography MSB Performance Measure SLSB Spatial Domain Threshold