A Novel Approach to Information Hiding Technique using ASCII Mapping Based Image Steganography

Steganography is hiding secret data in a cover without suspicion. This paper proposes a new information hiding technique using image steganography based on ASCII code matching. The cover image file is first read as decimal and the American Standard Code of Information Interchange (ASCII) code characters are searched, then the ASCII codes positions are stored in a mapping table. Similarly, the secret message is converted into decimal and hence matched to know the characters’ positions. Compression and encryption have also been applied to the characters’ positions of the secret message before being sent. The great advantage is that there will be no change in the image size nor pixels’ values, only the positions of the secret message are rather noted. Moreover, several experimental tests have been applied to demonstrate the efficiency and performance of the proposed method to evaluate it according to the widely used metrics: Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR) and the hiding capacity. From the security aspect, Structural Similarity Index Measure (SSIM) together with the Histogram analysis have been performed. The proposed method is further compared with some related works. The experimental results verified the effectiveness of the proposed method.

[1]  Shuliang Sun,et al.  A New Scheme for Image Steganography based on Hyperchaotic Map and DNA Sequence , 2018, J. Inf. Hiding Multim. Signal Process..

[2]  Hamid A. Jalab,et al.  An Overview on Hiding Information Technique in Images , 2010 .

[3]  Mohammed Abbas Fadhil Al-Husainy A New Image Steganography Based on Decimal-Digits Representation , 2011, Comput. Inf. Sci..

[4]  Vipul Sharma,et al.  A New Approach to Hide Text in Images Using Steganography , 2013 .

[5]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[7]  Ki-Hyun Jung,et al.  Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images , 2019, Secur. Commun. Networks.

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Keshav Joshi A New Approach of Text Steganography Using ASCII Values , 2018 .

[10]  Zheng Qin,et al.  Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..

[11]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[12]  Sabah Jassim,et al.  Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping , 2014, SSR.

[13]  Sukhpreet Kaur,et al.  A High Security Approach for Image Steganography by Mapping Pixels to Letters , 2010 .

[14]  Ari Moesriami Barmawi,et al.  Improving Data Hiding Capacity in Code Based Steganography using Multiple Embedding , 2020, J. Inf. Hiding Multim. Signal Process..

[15]  Anupama,et al.  INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY , 2011 .

[16]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[17]  K.Shalini K. Naga Prasanthi B.Swathi A REVIEW ON STEGANOGRAPHY USING IMAGES , 2013 .

[18]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[19]  Wojciech Mazurczyk,et al.  Trends in steganography , 2014, Commun. ACM.

[20]  N. Hamid,et al.  Image Steganography Techniques : An Overview , 2012 .

[21]  Goutam Sanyal,et al.  A multi level image steganography methodology based on adaptive PMS and block based pixel swapping , 2018, Multimedia Tools and Applications.

[22]  Samir Kumar Bandyopadhyay,et al.  LSB Layer Independent Robust Steganography using Binary Addition , 2016 .

[23]  Bin Li,et al.  A New Payload Partition Strategy in Color Image Steganography , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Shamim Ahmed Laskar High Capacity data hiding using LSB Steganography and Encryption , 2012 .

[25]  Youssoufa Mohamadou,et al.  Robust Steganography based on Matching Pixel Locations , 2017 .

[26]  Saurabh Singh,et al.  Use of image to secure text message with the help of LSB replacement , 2010 .