Cover
Vol. 10 No. 1 (2014)

Published: September 30, 2014

Pages: 15-0

Original Article

Image Hiding Using Variable Length Least Significant Bits Embedding

Abstract

In this work a new hiding system is proposed. It is based on Least Significant Bits (LSB) embedding of secrete image into another cover image. The proposed hiding algorithm embeds the secrete image bits in the least significant bits of the cover image pixels such that the number of secrete image bits that are embedded in least significant bits of cover image pixel is variable and determined randomly. Such cover image pixel may contain no secrete information bit, one bit, two bits , or three bits according to the pseudo random number generator that generates integer numbers randomly between 0 and 3. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret information. It ensures that the eavedroppers will not have any suspicion that message bits are hidden in the image. The proposed system achieves perfect reconstruction of the secret message.

References

  1. Lala Krikor et al, “Image Encryption Using DCT and Stream Cipher”, European Journal of Scientific Research, vol. 32, no. 1, pp 47-57, 2009.
  2. Hongxing Yao and Meng Li, “An Approach of Image Hiding and Encryption Based on a New Hyper-chaotic System”,,vol. 7, no. 3 pp. 379-384 , 2009.
  3. W. Bender , W. Butera , et al , “Applications for data hiding”, IBM Systems Journal ,Vol. 39, pp 547-568,2000
  4. W. Niblack, et al., “The QBIC project: querying images by content using color, texture, and shape,” Proc SPIE, Storage and Retrieval for Image and Video Database, vol. 1998, pp. 173-187, Feb. 1993.
  5. R. Chandramouli and N. Memon, “Analysis of LSB based Steganography”, IEEE ICIP, pp. 10221022, Oct. 2001
  6. D. Artz, “Digital Steganography: Hiding Data within Data” ,IEEE Internet Computing, pp. 75-80, May-June 2001.
  7. F. N. Jhonson , Z. Duric , and S Jajodia , “Information Hiding : Steganography and Water Marking Attacks and Counter Measured”, Klwer Academic Publishers,2001 .
  8. N. Provos. “Defending against statistical steganalysis. In 10th USENIX Security Symposium”, Washington, DC, 2001.
  9. A. Westfeld and A. P_tzmann.“ Attacks on steganographic systems. In Proceedings of Hiding”, Third Workshop, Dresden,
  10. Min Wu, and Bede Liu “Data Hiding Annotation”, Transaction on Multimedia, pp 528-538, August 2004.
  11. W. Bender, et al., “Techniques for Data Hiding”, Proc. of SPIE Conf. on Storage and Retrieval for Image and Video, Vol. 2420, pp. 40, Feb. 1995.
  12. N. Nikolaidis, I. Pitas, “Copyright Protection of Images using Robust Digital Signatures”, Proc. of, IEEE Int. Conf. on Acoustics, Speech, Signal Processing, Vol. 4, pp. 2168-2171, May 1996.
  13. P.H.W. Wong, O.C. Au, et al., “Image Watermarking Using Spread Spectrum Technique in Log-2-Spatio Domain”, Proc. of IEEE Int. Sym. on Circuits & Systems, Jun. 2000.
  14. Varsha Bhatt et al., “Implementation of New Advance Encryption Algorithm to Enhance Security of Multimedia Component” , vol. 2, no. 4, pp. 13-20, 2012.
  15. A. Menezes, P. van Oorschot, and S. Vanstone, “Handbook of Applied Cryptography” , CRC Press, 1996.
  16. H. H. Al _Obaidy ,"Encryption Using Wavelet Coded Image Data", MSc Thesis, Computer Engineering Department, College of Engineering ,University of Basrah,2004.
  17. Chin-Chen Chang., “A Fast and Secure Substitution”, International Journal of Pattern Recognition and Arti_cial 2002.