StegoBound: A Novel Image Steganography Technique Using Boundary-Based LSB Substitution

Syed Saad Ahmed, Mashal Memon, Rabeea Jaffari, Moazzam Jawaid

Abstract

The safe exchange of private information in the current web age is a significant security concern that has come around after developing steganography as a piece of conspicuous information concealing strategy. Steganography methods guarantee secure information by hiding the transmission channel and are described using three key boundaries: specific strength, implanting limit, and intangibility. The cutting-edge steganography strategies anyway neglect to accomplish an ideal compromise among the key steganographic factors. This research study describes a novel image steganography technique StegoBound based on gradient, which efficiently hides the secret message and produces excellent results for the essential steganographic characteristics. To produce top-notch stego-pictures, StegoBound shrouds the restricted information in the sixth, seventh, and eighth least significant bits (LSBs) of the boundary zone pixels in grayscale cover pictures. The nature of the stego-pictures is assessed through primary closeness file (SSIM), widespread picture quality file (UQI), mean square of error (MSE), Peak Signal to Noise Ratio (PSNR), mean qualities, and histogram investigation. The novel method's effectiveness evaluation is confirmed by calculating MSE, SSIM, PSNR, and UQI. Experimental results and comparative studies reveal that our proposed technique achieves state-of-the-art results in hiding the secret data by providing an optimal trade-off between imperceptibility, embedding capacity, and security.

 

 

Keywords: steganography, data hiding, LSB substitution, MSB, boundary.

 

 

 


Full Text:

PDF


References


DULUTA A., MOCANU S., PIETRARU R., MEREZEANU D., and SARU D. Secure Communication Method Based on Encryption and Steganography. 2017 21st International Conference on Control Systems and Computer Science. Institute of Electrical and Electronics Engineers, Piscataway, USA, 2017: 453-458. https://doi.org/10.1109/CSCS.2017.70

MISHRA R., & BHANODIYA P. A Review on Steganography and Cryptography. 2015 International Conference on Advances in Computer Engineering and Applications. Institute of Electrical and Electronics Engineers, Piscataway, USA, 2015: 119-122. https://doi.org/10.1109/ICACEA.2015.7164679

CHALLITA K., & FARHAT H. Combining Steganography and Cryptography: New Directions. International Journal on New Computer Architectures and Their Applications, 2011, 1: 199-208. http://oaji.net/articles/2015/544-1430753335.pdf

SAJEDI H., & JAMZAD M. Cover Selection Steganography Method Based on Similarity of Image Blocks. 2008 Institute of Electrical and Electronic Engineers 8th International Conference on Computer and Information Technology Workshops. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2008: 379-384. https://doi.org/10.1109/CIT.2008.Workshops.34

JOHNSON N. F., DURIC Z., and JAJODIA S. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Springer Science & Business Media, Berlin, Germany, 2001. https://link.springer.com/book/10.1007/978-1-4615-4375-6

BAILEY K., & CURRAN K. An Evaluation of Image Based Steganography methods. Multimedia Tools and Applications, 2006, 30: 55-88. https://doi.org/10.1007/s11042-006-0008-4

WESTFELD A., & PFITZMANN A. Attacks on Steganographic Systems. International Workshop on Information Hiding, 1999: 61-76. https://doi.org/10.1007/10719724_5

CHANU Y. J., TUITHUNG T., and SINGH K. M. A Short Survey on Image Steganography and Steganalysis Techniques. 2012 3rd National Conference on Emerging Trends and Applications in Computer Science. Institute of Electrical And Electronics Engineers, Piscataway, USA, 2012: 52-55. https://doi.org/10.1109/NCETACS.2012.6203297

KAUR S., BANSAL S., and BANSAL R. K. Steganography and Classification of Image Steganography Techniques. 2014 International Conference on Computing for Sustainable Global Development. Institute of Electrical And Electronics Engineers, Piscataway, USA, 2014: 870-875. https://doi.org/10.1109/IndiaCom.2014.6828087

SHARMA A., PORIYE M., and KUMAR V. A Review of Image Steganography Techniques: Development Trends to Enhance Performance. International Journal of Advanced Research in Computer Science, 2017, 8(5): 1852-1855. https://doi.org/10.26483/ijarcs.v8i5.3962

THANGADURAI K., & DEVI G. S. An Analysis of LSB Based Image Steganography Techniques. 2014 International Conference on Computer Communication and Informatics. Institute of Electrical and Electronics Engineers, Piscataway, USA, 2014: 1-4. https://doi.org/10.1109/ICCCI.2014.6921751

SWAIN G., & LENKA S. K. A Hybrid Approach to Steganography Embedding at Darkest and Brightest Pixels. 2010 International Conference on Communication and Computational Intelligence. Institute of Electrical and Electronics Engineers, Piscataway, USA, 2010: 529-534. https://ieeexplore.ieee.org/document/5738786

RACHAEL O., MISRA S., AHUJA R., ADEWUMI A., AYENI F., and MMASKELIUNAS R. Image Steganography and Steganalysis Based on Least Significant Bit (LSB). Proceedings of International Conference on Emerging Trends in Information Technology 2019. Springer, New-York, USA, 2020: 1100-1111. http://dx.doi.org/10.1007/978-3-030-30577-2_97

GHAZANFARI K., GHAEMMAGHAMI S., and KHOSRAVI S. R. LSB++: an Improvement to LSB+ Steganography. 2011-2011 Instiute of Electrical and Electronic Engineers Region 10 Conference. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2011: 364-368. https://doi.org/10.1109/TENCON.2011.6129126

JOSHI K., GILL S., and YADAV R. A New Method of Image Steganography Using 7th bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image. Journal of Computer Networks and Communications, 2018, 2018: 1-10. https://doi.org/10.1155/2018/9475142

SWAIN G. Digital Image Steganography Using Variable Length Group of Bits Substitution. Procedia Computer Science, 2016, 85: 31-38. https://doi.org/10.1016/j.procs.2016.05.173

HE J., TANG S., and WU T. An Adaptive Image Steganography Based on Depth-Varying Embedding. 2008 Congress on Image and Signal Processing. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2008: 660-663. https://doi.org/10.1109/CISP.2008.189

HLAING A. T., & THANT K. M. Color Image Steganography Using Cryptography and Magic LSB Substitution Method. 2018 Joint International Conference on Science, Technology and Innovation. Mandalay Technological University, Mandalay, Myanmar, 2018. https://www.researchgate.net/publication/334646919_Color_Image_Steganography_using_Cryptography_and_Magic_LSB_Substitution_Method_M-LSB-SM

SWAIN G., & LENKA S. K. A Technique for Secret Communication Using a new Block Cipher with Dynamic Steganography. International Journal of Security and Its Applications, 2012, 6: 1-12. http://article.nadiapub.com/IJSIA/vol6_no4/2.pdf

SHARMA V. Two New Approaches for Image Steganography Using Cryptography. 2015 Third International Conference on Image Information Processing. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2015: 202-207. https://doi.org/10.1109/ICIIP.2015.7414766

NILIZADEH A., and NILCHI A. R. N. A Novel Steganography Method Based on Matrix Pattern and LSB Algorithms in RGB Images. 2016 1st Conference on Swarm Intelligence and Evolutionary Computation. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2016: 154-159. https://doi.org/10.1109/CSIEC.2016.7482107

WU D.-C., & TSAI W.-H. A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 2003, 24: 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6

TSENG H.-W., & LENG H.-S. A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number. Journal of Applied Mathematics, 2013, 2013: 1-8. https://doi.org/10.1155/2013/189706

CHANG C.-C., & TSENG H.-W. A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters, 2004, 25: 1431-1437. https://doi.org/10.1016/j.patrec.2004.05.006

SWAIN G., & LENKA S. K. Steganography Using Two Sided, Three Sided, and Four Sided Side Match Methods. Computer Society of India Transactions on Information and Communication Technology, 2013, 1: 127-133. https://doi.org/10.1007/s40012-013-0015-3

MAHJABIN T., HOSSAIN S. M., and HAQUE M. S. A Block Based Data Hiding Method in Images Using Pixel Value Differencing and LSB Substitution Method. 2012 15th International Conference on Computer and Information Technology. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2012: 168-172. https://doi.org/10.1109/ICCITECHN.2012.6509770

BASSIL Y. Image Steganography Based on a Parameterized Canny Edge Detection Algorithm. International Journal of Computer Applications, 2012, 60(4): 35-40. https://doi.org/10.5120/9682-4112

JUNEJA M., & SANDHU P. S. An Improved LSB Based Steganography Technique for RGB Color Images. International Journal of Computer and Communication Engineering, 2013, 2: 513. http://www.ijcce.org/papers/238-W1028.pdf

KAUR A., & KAUR S. Image Steganography Based on Hybrid Edge Detection and 2k Correction Method. International Journal of Engineering and Innovative Technology, 2012, 1: 167-170. http://dx.doi.org/10.1063/1.4897776

JOIS A., & TEJASWINI L. Survey on LSB Data Hiding Techniques. 2016 International Conference on Wireless Communications, Signal Processing and Networking. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2016: 656-660. https://doi.org/10.1109/WiSPNET.2016.7566214

ASHWIN S., RAMESH J., KUMAR S. A., and GUNAVATHI K. Novel and Secure Encoding and Hiding Techniques Using Image Steganography: A Survey. 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2012: 171-177. https://doi.org/10.1109/ICETEEEM.2012.6494463

GARG M. R. Comparison Of LSB & MSB Based Steganography In Gray-Scale Images. International Journal of Engineering Research and Technology, 2012, 1(8): 1-6. https://www.ijert.org/research/comparison-of-lsb-msb-based-steganography-in-gray-scale-images-IJERTV1IS8630.pdf

SATHISHA N., MADHUSUDAN G., BHARATHESH S., BABU K. S., RAJA K., and VENUGOPAL K. Chaos Based Spatial Domain Steganography Using MSB. 2010 5th International Conference on Industrial and Information Systems. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2010: 177-182. https://doi.org/10.1109/ICIINFS.2010.5578711

YALMAN Y., AKAR F., and ERTURK I. An Image Interpolation Based Reversible Data Hiding Method Using R-Weighted Coding. 2010 13th Institute of Electrical and Electronics Engineering International Conference on Computational Science and Engineering. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2010: 346-350. https://doi.org/10.1109/CSE.2010.52

MANDAL J., & DAS D. Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques, 2012, 2: 17-24. https://doi.org/10.5121/IJIST.2012.2408

GUPTA P. K., ROY R., and CHANGDER S. A Secure Image Steganography Technique with Moderately Higher Significant Bit Embedding. 2014 International Conference on Computer Communication and Informatics. Institute Of Electrical And Electronics Engineers, Piscataway, USA, 2014: 1-6. http://dx.doi.org/10.1109/ICCCI.2014.6921726

ISLAM A. U., KHALID F., SHAH M., KHAN Z., MAHMOOD T., KHAN A., MAHMOOD T., KHAN A., ALI U., and NAEEM M. An Improved Image Steganography Technique Based on MSB Using Bit Differencing. 2016 Sixth International Conference on Innovative Computing Technology. Institute of Electrical And Electronics Engineers, Piscataway, USA, 2016: 265-269. https://doi.org/10.1109/INTECH.2016.7845020

PUTEAUX P., TRINEL D., and PUECH W. High-Capacity Data Hiding in Encrypted Images Using MSB Prediction. 2016 Sixth International Conference on Image Processing Theory, Tools and Applications. Institute of Electrical and Electronics Engineers, Piscataway, USA, 2016: 1-6. https://doi.org/10.1109/IPTA.2016.7820991

AHMED S., JAFFARI R., and THEBO L. A. Data Hiding Using Green Channel as Pixel Value Indicator. International Journal of Image Processing, 2018, 12: 90-100. https://www.cscjournals.org/manuscript/Journals/IJIP/Volume12/Issue3/IJIP-1169.pdf

SHARMA A., PORIYE M., and KUMAR V. A Secure Steganography Technique Using MSB. International Journal of Emerging Research in Management and Technology, 2017, 6: 208-214. https://doi.org/10.23956/ijermt.v6i6.270

AKINOLA S. O., & OLATIDOYE A. A. On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images. International Journal of Computer Science & Information Technology, 2015, 7: 79-91. http://dx.doi.org/10.5121/ijcsit.2015.7407

DHANNOON B. N. An Indirect MSB Data Hiding Technique. Life Science Journal, 2013, 10: 263-266. http://www.lifesciencesite.com/lsj/life1011s/046_21081life1011s_263_266.pdf

KUMAR M. A., & KAHAR M. Variant of LSB Steganography Algorithm for Hiding Information in RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2017, 10(1): 35-48. http://dx.doi.org/10.14257/ijsip.2017.10.1.05

JAFFARI R., HASHMANI M. A., TAIB H., ABDULLAH N., and RIZVI S. S. H. A Novel Image-Based Framework for Process Monitoring and Fault Diagnosis of Mooring Lines. Journal of Hunan University Natural Sciences, 2020, 47(10): 100-114. http://jonuns.com/index.php/journal/article/view/453


Refbacks

  • There are currently no refbacks.