Image and Audio Steganography Based on Indirect LSB

Authors

  • Zainab Namh Sultani Computer Science Department, College of Science, Al-Nahrain University http://orcid.org/0000-0001-9758-7562
  • Ban Nadeem Dhannoon Computer Science Department, College of Science, Al-Nahrain University

DOI:

https://doi.org/10.48129/kjs.v48i4.8992

Abstract

Hiding the presence of data during communication has become a pressing concern in this extremely digitalized world due to the unauthorized data access and network violations that are rapidly emerging. These concerns have led to cryptography and steganography techniques as methods for securing data. Steganography is the process of concealing confidential information in the codes that creates digital files. This paper presents a modified information-hiding technique based on indirect least significant bit hiding. Instead of saving each bit of the secret message in the Least Significant Bit (LSB) of the cover media, each bit of the secret message is compared to a specific bit in the cover media, and the result of the comparison is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. In image steganography, each channel (red, green and blue) is used to conceal the secret message; the location of the bit that is used to compare to the secret message is generated for each channel using the binary representation of the first cell for each channel. In audio steganography, the bit location for each audio sample is retrieved from the bit representation of the audio length. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance in terms of the quality metrics PSNR, SNR and SSIM.

References

ABDELWAHAB, O. F., HUSSEIN, A. I., HAMED, H. F., KELASH, H. M., KHALAF, A. A. & ALI, H. M. (2019). Hiding data in images using steganography techniques with compression algorithms. Telkomnika, 17, 1168-1175.

ALI, A. H. & GEORGE, L. (2016). A review on audio steganography techniques. Research Journal of Applied Sciences, Engineering and Technology, 12, 154-162.

ARORA, S. K. (2018). Audio Steganography : The art of hiding secrets within earshot (part 1 of 2) [Online]. https://medium.com. Available: https://medium.com/@sumit.arora/audio-steganography-the-art-of-hiding-secrets-within-earshot-part-1-of-2-6a3bbd706e15 [Accessed 2019].

BHARDWAJ, R. & SHARMA, V. (2016). Image steganography based on complemented message and inverted bit LSB substitution. Procedia Computer Science, 93, 832-838.

DHANNOON, B. N. (2013). An Indirect MSB Data Hiding Technique. Life Science Journal, 10.

HMOOD, D. N., KHUDHIAR, K. A. & ALTAEI, M. S. 2012. A new steganographic method for embedded image in audio file. International Journal of Computer Science and Security (IJCSS), 6, 135-141.

HOSNY, A. A., MURTADA, W. A. & YOUSSEF, M. I. Improving LSB Audio Steganography Using Simulated Annealing for Satellite Telemetry. (2018). International Computer Engineering Conference (ICENCO), 2018. IEEE, 11-16.

ISLAM, M. R., SIDDIQA, A., UDDIN, M. P., MANDAL, A. K. & HOSSAIN, M. D. (2014). An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. International Conference on Informatics, Electronics & Vision (ICIEV), 2014. IEEE, 1-6.

JOSE, M. (2014). Hiding image in image using LSB insertion method with improved security and quality. International Journal of Science and Research, 3, 2281-2284.

JUNG, K.-H. & YOO, K.-Y. (2009). Improved exploiting modification direction method by modulus operation. International Journal of Signal processing, Image processing and pattern, 2, 79-87.

LATEF, S., HASSAN, N. A. & DHANNOON, B. N. (2011). Color image encryption using random password seed and linear feed back shift register. Al-Nahrain Journal of Science, 14, 186-192.

MAHMOOD, M. B. & DHANNOON, B. N. (2019). Information hiding by using Developed M8PAM.

MANIRIHO, P. & AHMAD, T. Information hiding scheme for digital images using difference expansion and modulus function. Journal of King Saud University-Computer and Information Sciences, 31, 335-347.

MATHWORKS. (2019). Sample Audio Files - Matlab & Simulink [Online]. Mathworks. Available: https://www.mathworks.com/help/audio/ug/sample-audio-files.html.

MOHSIN, A. T. (2013). A New Steganography Technique Using Knight's Tour Algorithm, Affine Cipher and Huffman Coding. Universiti Teknologi Malaysia.

PATHAK, P., CHATTOPADHYAY, A. K. & NAG, A. (2014). A new audio steganography scheme based on location selection with enhanced security. First International Conference on Automation, Control, Energy and Systems (ACES), 2014. IEEE, 1-4.

RAJPUT, S. P., ADHIYA, K. P. & PATNAIK, G. K. (2017). An Efficient Audio Steganography Technique to Hide Text in Audio. International Conference on Computing, Communication, Control and Automation (ICCUBEA), 2017. IEEE, 1-6.

SHEN, S.-Y., HUANG, L.-H. & YU, S.-S. (2018). A novel adaptive data hiding based on improved EMD and interpolation. Multimedia Tools and Applications, 77, 12563-12579.

SIPI Image Database [Online]. Available: http://sipi.usc.edu/

SULTANI, Z., AL-TUMA, R. F. & WEFEL, S. (2016). Color Reduction in an Authenticate Live 3D Point Cloud Video Streaming System. Computers, 5, 17.

SWAIN, G. (2019). Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution. Arabian Journal for Science and Engineering, 44, 2995-3004.

TALEBY AHVANOOEY, M., LI, Q., HOU, J., RAJPUT, A. R. & CHEN, Y. (2019). Modern text hiding, text steganalysis, and applications: a comparative analysis. Entropy, 21, 355.

TANWAR, R., SHARMA, B. & MALHOTRA, S. (2014). A robust substitution technique to implement audio steganography. International Conference on Reliability Optimization and Information Technology (ICROIT), 2014. IEEE, 290-293.

YOUNUS, Z. S. & YOUNUS, G. T. (2019). Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data. Journal of Intelligent Systems.

ZHOU, W.(2004). Image quality assessment: from error measurement to structural similarity. IEEE transactions on image processing, 13, 600-613.

Published

16-08-2021