Open Access
Subscription Access
Steganographic Substitution of the Least Significant Bit Determined through Analysis of the Cover Image and the Encrypted Message
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the crypto-message. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
Keywords
Steganographic Scheme, Information Encryption, Substitution of the Least Significant Bits.
User
Font Size
Information
- Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 14(3), 1361-1366.
- Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28.
- Isaza, G. A., Espinosa, C. A., & Ocampo, S. M. (2018) Análisis de técnicasesteganograficas y estegoanalisisencanalesencubiertos, imágenes y archivos de sonido.
- Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and provide security using cryptography. International journal of scientific & technology research, 1(6), 68-70.
- Jamal A. Othman.(2014). Steganographic scheme to avoid statistical Steganalysis. JOURNAL OF THE COLLEGE OF EDUCATION FOR WOMEN, 25(1), 249-256.
- Wu, H. Z., Wang, H. X., & Shi, Y. Q. (2016). Can Machine Learn Steganography?-Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. arXiv preprint arXiv:1606.05294.
- Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
- Li, S., Chen, G., &Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International journal of Bifurcation and Chaos, 15(10), 3119-3151.
- Zhang, T., & Ping, X. (2003). A new approach to reliable detection of LSB steganography in natural images. Signal processing, 83(10), 2085-2093.
- Al-Fadhel, T. A. (2007). Gauss map vs Bernoulli shift. Applied Mathematics and Computation, 194(2), 520-526.
- Miri, A., &Faez, K. (2017). Adaptive image steganography based on transform domain via genetic algorithm. Optik-International Journal for Light and Electron Optics, 145, 158-168.
- Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique. Multimedia Tools and Applications, 1-30.
- Ghebleh, M., &Kanso, Ax. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.
Abstract Views: 380
PDF Views: 172