Message Segmentation to Enhance the Security of LSB Image Steganography

Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique. Keywords—Security; Distortion; Embedding; Substitution. I. INTRODUCTION Steganography is one of many techniques that are used to hide secret information to prevent any attackers to make damage in this information or use it in illegal form. Steganography can be defined as the technique used to embed data or other secret information inside some other object commonly referred to as cover, by changing its properties. The purpose of steganography is to set up a secret communication path between two parties such that any person in the middle cannot detect its existence; the attacker should not gain any information about the embedded data by simply looking at cover file or stego file. Steganography is the art of hiding information in ways that prevent the detection of hidden messages. Steganography, derived from Greek, literally means "covered writing." It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and

[1]  Xiaolin Wu,et al.  A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.

[2]  Adnan Abdul-Aziz Gutub,et al.  Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[3]  Aman Jantan,et al.  A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion , 2008 .

[4]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[5]  Mei-Yi Wu,et al.  An iterative method of palette-based image steganography , 2004, Pattern Recognit. Lett..

[6]  Homayun Motameni,et al.  Labeling Method in Steganography , 2007 .

[7]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[8]  Gandharba Swain,et al.  A Technique for Secure Communication Using Message Dependent Steganography , 2010 .

[9]  Mohammed Abbas Fadhil Al-Husainy Image Steganography by Mapping Pixels to Letters , 2009 .

[10]  Guillermo Sapiro,et al.  Is image steganography natural? , 2005, IEEE Transactions on Image Processing.

[11]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[12]  Geeta Sikka,et al.  A New Image Steganography Based On First Component Alteration Technique , 2010, ArXiv.

[13]  Hong-Juan Zhang,et al.  A Novel Image Steganography Algorithm Against Statistical Analysis , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[14]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[15]  Xinpeng Zhang,et al.  Multibit Assignment Steganography in Palette Images , 2008, IEEE Signal Processing Letters.

[16]  Tai-hoon Kim,et al.  Receiver Compatible Data Hiding in Color Image , 2009 .

[17]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[18]  Sangjin Lee,et al.  High Quality Perceptual Steganographic Techniques , 2003, IWDW.

[19]  Ran-Zan Wang,et al.  High-payload image steganography using two-way block matching , 2006, IEEE Signal Processing Letters.

[20]  Hideki Noda,et al.  High-performance JPEG steganography using quantization index modulation in DCT domain , 2006, Pattern Recognit. Lett..

[21]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[22]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..