Open Access Open Access  Restricted Access Subscription Access

Steganographic Substitution of the Least Significant Bit Determined through Analysis of the Cover Image and the Encrypted Message


Affiliations
1 Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, Mexico
 

The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto-message. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.

Keywords

Steganographic Scheme, Information Encryption, Substitution of the Least Significant Bits.
User
Notifications
Font Size

  • Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 14(3), 1361-1366.
  • Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28.
  • Isaza, G. A., Espinosa, C. A., & Ocampo, S. M. (2018) Análisis de técnicasesteganograficas y estegoanalisisencanalesencubiertos, imágenes y archivos de sonido.
  • Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and provide security using cryptography. International journal of scientific & technology research, 1(6), 68-70.
  • Jamal A. Othman.(2014). Steganographic scheme to avoid statistical Steganalysis. JOURNAL OF THE COLLEGE OF EDUCATION FOR WOMEN, 25(1), 249-256.
  • Wu, H. Z., Wang, H. X., & Shi, Y. Q. (2016). Can Machine Learn Steganography?-Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. arXiv preprint arXiv:1606.05294.
  • Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
  • Li, S., Chen, G., &Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International journal of Bifurcation and Chaos, 15(10), 3119-3151.
  • Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural images. Signal processing, 83(10), 2085-2093.
  • Al-Fadhel, T. A. (2007). Gauss map vs Bernoulli shift. Applied Mathematics and Computation, 194(2), 520-526.
  • Miri, A., &Faez, K. (2017). Adaptive image steganography based on transform domain via genetic algorithm. Optik-International Journal for Light and Electron Optics, 145, 158-168.
  • Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique. Multimedia Tools and Applications, 1-30.
  • Ghebleh, M., &Kanso, Ax. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.

Abstract Views: 378

PDF Views: 172




  • Steganographic Substitution of the Least Significant Bit Determined through Analysis of the Cover Image and the Encrypted Message

Abstract Views: 378  |  PDF Views: 172

Authors

Martha Angelica Garcia-Villa
Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, Mexico
Ricardo Francisco Martinez-Gonzalez
Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, Mexico
Juan Francisco Mejia-Perez
Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, Mexico
Miguel Valerio-Canales
Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, Mexico
Yesenia Isabel Moreno-Pavan
Tecnologico Nacional de Mexico/IT Veracruz, Veracruz, Mexico

Abstract


The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto-message. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.

Keywords


Steganographic Scheme, Information Encryption, Substitution of the Least Significant Bits.

References