International journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN:2313-626X

Frequency: 12

line decor
  
line decor

 Volume 6, Issue 5 (May 2019), Pages: 84-91

----------------------------------------------

 Original Research Paper

 Title: A novel steganography technique using grayscale image segmentation

 Author(s): Fakhar Ullah Mangla 1, *, Saira Nokhaiz 2, Muhammad Ramzan 1, Ikram Ullah Lali 3

 Affiliation(s):

 1Department of CS and IT, University of Sargodha, Sargodha, Pakistan
 2Department of Computer Science, University of Lahore, Lahore, Pakistan
 3Department of CS and IT, University of Gujrat, Gujrat, Pakistan

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0003-2116-9959

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2019.05.014

 Abstract:

Steganography is used for invisible secured communication. In this technique, information is hidden on different medium like audio, video, text, or images by using different approaches or algorithms. This research has developed a novel steganography technique which combines grayscale image segmentation and least significant bit (LSB) substitution methods to hide information. In the proposed technique the cover image is segmented in a different number of blocks. Each block hides just one bit of information in its LSB. The number of blocks is directly proportional to the size of the information in bits. In such a way, information is hidden in the whole image, not in a specific area of an image, so there is no image degradation. 

 © 2019 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Steganography, Cover image, Secret message, Least significant bit substitution

 Article History: Received 25 October 2018, Received in revised form 21 February 2019, Accepted 25 March 2019

 Acknowledgement:

No Acknowledgement. 

 Compliance with ethical standards

 Conflict of interest:  The authors declare that they have no conflict of interest.

 Citation:

 Mangla FU, Nokhaiz S, and Ramzan M et al. (2019). A novel steganography technique using grayscale image segmentation. International Journal of Advanced and Applied Sciences, 6(5): 84-91

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 Fig. 9 Fig. 10 Fig. 11 Fig. 12 Fig. 13 Fig. 14 Fig. 15 Fig. 16 

 Tables

 Table 1 Table 2 Table 3

----------------------------------------------

 References (20)

  1. Alam FI, Bappee FK, and Khondker FU (2011). An investigation into encrypted message hiding through images using LSB. International Journal of Engineering Science and Technology, 3(2): 948-960.   [Google Scholar]
  2. Avcibas I, Memon N, and Sankur B (2003). Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2): 221-229. https://doi.org/10.1109/TIP.2002.807363   [Google Scholar] PMid:18237902
  3. Balgurgi PP and Jagtap SK (2012). Intelligent processing: An approach of audio steganography. In the International Conference on Communication, Information and Computing Technology, IEEE, Mumbai, India: 1-6. https://doi.org/10.1109/ICCICT.2012.6398182   [Google Scholar]
  4. Bawaneh MJ and Obeidat AA (2016). A secure robust gray scale image steganography using image segmentation. Journal of Information Security, 7(3): 152-164. https://doi.org/10.4236/jis.2016.73011   [Google Scholar]
  5. Changder S, Debnath NC, and Ghosh D (2009). A new approach to Hindi text steganography by shifting matra. In the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, IEEE, Kottayam, Kerala, India: 199-202. https://doi.org/10.1109/ARTCom.2009.122   [Google Scholar]
  6. Gadiparthi M, Sagar K, Sahukari D, and Chowdary R (2011). A high capacity steganographic technique based on LSB and PVD modulus methods. International Journal of Computer Applications, 22(5): 8-11.   [Google Scholar]
  7. Hussain M and Hussain M (2013). A survey of image steganography techniques. International Journal of Advanced Science and Technology, 54: 113-124.   [Google Scholar]
  8. Juneja M and Sandhu PS (2009). Designing of robust image steganography technique based on LSB insertion and encryption. In the International Conference on Advances in Recent Technologies in Communication and Computing, IEEE, Kottayam, Kerala, India: 302-305. https://doi.org/10.1109/ARTCom.2009.228   [Google Scholar]
  9. Manjula GR and Danti A (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. International Journal of Security, Privacy and Trust Management, 4(1): 11-20.   [Google Scholar]
  10. Nilizadeh AF and Nilchi ARN (2013). Steganography on RGB images based on a "Matrix Pattern" using random blocks. International Journal of Modern Education and Computer Science, 5(4): 8-18. https://doi.org/10.5815/ijmecs.2013.04.02   [Google Scholar]
  11. Pftizmann B (1996). Information hiding terminology-results of an informal plenary meeting and additional proposals. In the First International Workshop on Information Hiding, Springer-Verlag, Berlin, Germany, 1174: 347-350.   [Google Scholar]
  12. Rahman MM, Mondal PK, Mandal I, and Sultana H (2016). Secure RGB image steganography based on triple-a algorithm and pixel intensity. International Journal of Scientific and Engineering Research, 7(3): 864-869.   [Google Scholar]
  13. Rosaline SI and Raj MA (2013). Adaptive pixel pair matching based steganography for audio files. In the International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System, IEEE, Tiruvannamalai, India: 1-5. https://doi.org/10.1109/ICEVENT.2013.6496572   [Google Scholar] PMid:23956540 PMCid:PMC3740649
  14. Shrivastava A and Singh L (2016). A new hybrid encryption and steganography technique: A survey. International Journal of Advanced Technology and Engineering Exploration, 3(14): 9-14. https://doi.org/10.19101/IJATEE.2016.314005   [Google Scholar]
  15. Sravanthi GS, Devi BS, Riyazoddin SM, and Reddy MJ (2012). A spatial domain image steganography technique based on plane bit substitution method. Global Journal of Computer Science and Technology Graphics and Vision. 12(15): 176-179.   [Google Scholar]
  16. Tiwari N, Sandilya M, and Chawla M (2014). Spatial domain image steganography based on security and randomization. International Journal of Advanced Computer Science and Applications, 5(1): 156-159. https://doi.org/10.14569/IJACSA.2014.050121   [Google Scholar]
  17. Umamaheswari M, Sivasubramanian S, and Pandiarajan S (2010). Analysis of different steganographic algorithms for secured data hiding. IJCSNS International Journal of Computer Science and Network Security, 10(8): 154-160.   [Google Scholar]
  18. Vishal W (1992). Bryon, Linear, color separablehuman visual system model for vector diffusioning system. Journal of Electronic Imaging, 1: 277-292.   [Google Scholar]
  19. Viswanatham VM and ManikondaJ (2010). A novel technique for embedding data in spatial domain. International Journal on Computer Science and Engineering, 2(2): 233-236.   [Google Scholar]
  20. Zhang HJ and Tang HJ (2007). A novel image steganography algorithm against statistical analysis. In the International Conference on Machine Learning and Cybernetics, IEEE, Hong Kong, China, 7: 3884-3888. https://doi.org/10.1109/ICMLC.2007.4370824   [Google Scholar]