Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Flexible security system suitable to hide sensitive text-data on personal computer (PC) is proposed and implemented. The system provides security information to the user to select the cover-image within the PC based on his/her security priority. The technique flexibility allows the user to test several images to hide the same text within. Then, the user chooses one image to be used as cover image based on his selection knowing the security priority needed. The system uses normal image based steganography replacing the pixel least significant bit with text-hidden. The study explores the data dependency and its security effects by experimenting 30 different fixed size images showing interesting attractive results.

[1]  Mehdi Hussain,et al.  A Survey of Image Steganography Techniques , 2013 .

[2]  Shailender Gupta,et al.  Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .

[3]  Adnan Gutub,et al.  Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator , 2010 .

[4]  A. A-A Gutub,et al.  Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[5]  Nouf A. Al-Otaibi,et al.  2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .

[6]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[7]  P. A. Vijaya,et al.  Secure Data Hiding Algorithm Using Encrypted Secret message , 2012 .

[8]  Hitesh Gupta,et al.  A Survey of Information Hiding Techniques , 2013 .

[9]  Asoke Nath,et al.  Symmetric Key Cryptography Using Random Key Generator , 2010, Security and Management.

[10]  A. Gutub,et al.  Vibrant Color Image Steganography using Channel Differences and Secret Data Distribution , 2010 .

[11]  Adnan Abdul-Aziz Gutub,et al.  Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[12]  Asoke Nath,et al.  Advanced Steganography Algorithm using Encrypted secret message , 2011 .

[13]  Luca Iocchi,et al.  Image based steganography and cryptography , 2007, VISAPP.

[14]  Vivek Jain,et al.  PUBLIC-KEY STEGANOGRAPHY BASED ON MODIFIED LSB METHOD , 2012 .