A new algorithm is presented for hiding a secret image in the least significant bits of a cover image. The images used may be color or grayscale images. The number of bits used for hiding changes according to pixel neighborhood information of the cover image. The exclusive-or (XOR) of a pixel's neighbors is used to determine the smoothness of the neighborhood. A higher XOR value indicates less smoothness and leads to using more bits for hiding without causing noticeable degradation to the cover image. Experimental results are presented to show that the algorithm generally hides images without significant changes to the cover image, where the results are sensitive to the smoothness of the cover image. Keywords—image steganography; information hiding; LSB method I. INTRODUCTION Steganography is a method of hiding a secret message inside other information so that the existence of the hidden message is concealed. Cryptography, in contrast, is a method of scrambling hidden information so that unauthorized persons will not be able to recover it. The main advantage steganography has over cryptography is that it hides the actual existence of secret information, making it an unlikely target of spying attacks. To achieve higher security, a combination of steganography with cryptography may be used. In this paper, a new algorithm is presented to hide information in the least significant bits (LSBs) of image pixels. The algorithm uses a variable number of hiding bits for each pixel, where the number of bits is chosen based on the amount of visible degradation they may cause to the pixel compared to its neighbors. The amount of visible degradation is expected to be higher for smooth areas, so the number of hiding bits is chosen to be proportional to the exclusive-or (XOR) of the pixel's neighbors. Analysis showed effectiveness of the algorithm in minimizing degradation while it was sensitive to the smoothness of cover images.
[1]
Mohammed Abbas Fadhil Al-Husainy.
A New Image Steganography Based on Decimal-Digits Representation
,
2011,
Comput. Inf. Sci..
[2]
Mohsin Iftikhar,et al.
A survey about the latest trends and research issues of cryptographic elements
,
2011
.
[3]
V. L. Reddy,et al.
Implementation of LSB Steganography and its Evaluation for Various File Formats
,
2011
.
[4]
Anupama,et al.
INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY
,
2011
.
[5]
G. G. Stokes.
"J."
,
1890,
The New Yale Book of Quotations.
[6]
Gandharba Swain,et al.
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
,
2012
.
[7]
Jiaohua Qin,et al.
Random Image Steganography and Steganalysis: Present Status and Future Directions
,
2012
.
[8]
Subariah Ibrahim,et al.
Adaptive image steganography based on optimal embedding and robust against chi-square attack
,
2011
.
[9]
Abdulaleem Z. Al-Othmani,et al.
A survey on steganography techniques in real time audio signals and evaluation
,
2012
.
[10]
J. Chhajed,et al.
Review on Binary Image Steganography and Watermarking
,
2011
.
[11]
Zarinah Mohd Kasirun,et al.
On the capacity and security of steganography approaches: An overview
,
2010
.
[12]
K. Thenmozhi,et al.
Pixel Forefinger for Gray in Color: A Layer by Layer Stego
,
2012
.