Multistage Three Layers Image Steganography Using LSB with Enhanced Security
نویسندگان
چکیده
Now-a-days a fast growth of internet in the present world, social networking websites like Twitter& Facebook are being increasingly used by individuals of all over the world to share their life activities and events via images. But this vastly popular observable fact of image sharing on internet is exposed to a lot of risks. At present, these social networking websites are not bounded by stringent privacy and copyright laws. Thus original image, once shared, could be easily downloaded and edited by the miscreants. For Secret data, Image Steganography is the science that provides communication of secret data in an appropriate multimedia carrier, e.g., image. It comes under the assumption that if the feature is visible, the point of attack is evident, therefore the goal here is always to conceal the very existence of the embedded data. This work is concerned with implementing Steganography for images, with an improvement in security and image quality. This paper presents a novel technique for image steganography based on three layers Image Steganography & Least significant bit (LSB) of each of the pixel's intensity of cover image. In addition with LSB and three layers the secret image is converted into text so that no one can understand the message and then this text is embedded in cover image. The experimental result shows that the our methodology has a high capacity and a good invisibility with security. The experimental results showed that the anti-detection robustness of image steganography combined with preprocessing of two stage scheme is found much better than the way using LSB steganography algorithms directly. To improve the robustness of steganography, The proposed method shows good enhancement to Least Significant Bit technique in consideration to security as well as image quality. Keywords-Steganography, LSB, Multi Layer Steganography, Encoding.
منابع مشابه
Optimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملSecret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملLSB Steganography in Color and Grayscale Images without using the Transformation
ISSN 2250 – 1053 | © 2011 Bonfring Abstract--A technique which enables to have a secret communication in modern technology using public channel is known as steganography This paper deals with constructing and implementing new algorithm based on hiding a large amount of payloads (image, audio, text) file into color image. We have been used adaptive image filtering and adaptive image segmentation...
متن کاملAn enhanced mechanism for image steganography using sequential colour cycle algorithm
Several problems arise among the existing LSB-based image steganographic schemes due to distortion in a stegoimage and limited payload capacity. Thus, a proposed scheme has been developed with the aims to help in improving the payload of the secret data at the same time retaining the quality of the stego-image produced within an acceptance threshold. This study has led to the modification of th...
متن کاملSecure Secret Key Transfer Using Modified Hash Based LSB method
Recent advancements in computer security have shifted the focus of security officials from, using only the cryptography techniques to using steganography as well, or the combination of both. In steganography the most widely used technique is the LSB method, but this technique being the simplistic of all, is well known and hence is vulnerable to attacks. However, modifying the LSB method to the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014