An Enhanced Method for Data Hiding using 2-Bit XOR in Image Steganography

As we all know security is needed when we want to send data over any medium so this requires a secure medium to send data. That’s why steganography comes in mind whose aim is to send data securely without knowing of any hacker. In this paper, a new technique is projected whose aim is to keep secrete communication intact. The proposed method blends the advantage of 2 bit LSB and XOR operation. In this, first we are XORing the 8th, 1st bit of data and 7th, 2nd bit of data after this two bit are obtained. These obtained bits are replaced at the LSB position. However, with some way, any person get know about hidden message and it takes the LSB position bit then there are no chances of getting message as it is not the actual message. An experiment was performed with different dataset of images. Furthermore, it was observed that the proposed method promises good result as the PSNR and MSE are good. When the method was compared with other existing methods, it shows enhancement in the imperceptibility and message capacity. Keyword Steganography, XOR, Information Hiding, LSB

[1]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .

[2]  T. Narasimmalou,et al.  Optimized discrete wavelet transform based steganography , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[3]  Wen-Yuan Chen,et al.  Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques , 2008, Appl. Math. Comput..

[4]  Kamaldeep Joshi,et al.  PSNR and MSE based investigation of LSB , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

[5]  Khan Muhammad,et al.  A Secure Cyclic Steganographic Technique for Color Images using Randomization , 2015, ArXiv.

[6]  Firas A. Jassim,et al.  A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method , 2013, ArXiv.

[7]  Ki-Hyun Jung,et al.  Steganographic method based on interpolation and LSB substitution of digital images , 2014, Multimedia Tools and Applications.

[8]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[9]  Ahmad T. Al-Taani,et al.  A Novel Steganographic Method for Gray-Level Images , 2009 .

[10]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[11]  Al-Sakib Khan Pathan,et al.  Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform , 2013, SecureComm.

[12]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[13]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[14]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[15]  Amir-Masoud Eftekhari-Moghadam,et al.  Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.

[16]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[18]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[19]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[20]  Reza Safabakhsh,et al.  High-capacity method for hiding data in the discrete cosine transform domain , 2013, J. Electronic Imaging.