A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. Every communication body wants to secure thei...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , , , |
| منشور في: |
2022
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513560906825728 |
|---|---|
| author | Shahid Rahman (16904613) |
| author2 | Jamal Uddin (2037424) Habib Ullah Khan (12024579) Hameed Hussain (15138547) Ayaz Ali Khan (13902882) Muhammad Zakarya (16904616) |
| author2_role | author author author author author |
| author_facet | Shahid Rahman (16904613) Jamal Uddin (2037424) Habib Ullah Khan (12024579) Hameed Hussain (15138547) Ayaz Ali Khan (13902882) Muhammad Zakarya (16904616) |
| author_role | author |
| dc.creator.none.fl_str_mv | Shahid Rahman (16904613) Jamal Uddin (2037424) Habib Ullah Khan (12024579) Hameed Hussain (15138547) Ayaz Ali Khan (13902882) Muhammad Zakarya (16904616) |
| dc.date.none.fl_str_mv | 2022-11-24T00:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1109/access.2022.3224745 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/A_Novel_Steganography_Technique_for_Digital_Images_Using_the_Least_Significant_Bit_Substitution_Method/24056301 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Data management and data science Graphics, augmented reality and games Steganography Data privacy Error analysis Digital images Current measurement Numerical simulation Robustness Image steganography LSB Image quality assessment metrics Histogram analysis Image Capacity |
| dc.title.none.fl_str_mv | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. Various techniques used for secure communication in order to address these issues, steganography plays an important role. Steganography is the process of obfuscation that makes something incomprehensible and unclear. Different image steganography research methods are proposed recently but each has their advantages and disadvantages and still have necessity to develop some better image steganography mechanisms to achieve the reliability between the basics criteria of image steganography. Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. The experimental outcomes of the suggested approach prove further developed strength and justify the feasibility of our research. Through numerical simulations, we observed that the proposed strategy outperformed the next-best current methodology by 5.561 percent in terms of PSNR Correlation score. Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. Embedding different sizes of a particular secret message in a different image (such as Gray, Texture, Aerial and RGB images) came out with about 5.466 percent of better score.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2022.3224745" target="_blank">https://dx.doi.org/10.1109/access.2022.3224745</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_66b4eaac4e0984c23aac9ad83e49b251 |
| identifier_str_mv | 10.1109/access.2022.3224745 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/24056301 |
| publishDate | 2022 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution MethodShahid Rahman (16904613)Jamal Uddin (2037424)Habib Ullah Khan (12024579)Hameed Hussain (15138547)Ayaz Ali Khan (13902882)Muhammad Zakarya (16904616)Information and computing sciencesCybersecurity and privacyData management and data scienceGraphics, augmented reality and gamesSteganographyData privacyError analysisDigital imagesCurrent measurementNumerical simulationRobustnessImage steganographyLSBImage quality assessment metricsHistogram analysisImageCapacity<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. Various techniques used for secure communication in order to address these issues, steganography plays an important role. Steganography is the process of obfuscation that makes something incomprehensible and unclear. Different image steganography research methods are proposed recently but each has their advantages and disadvantages and still have necessity to develop some better image steganography mechanisms to achieve the reliability between the basics criteria of image steganography. Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. The experimental outcomes of the suggested approach prove further developed strength and justify the feasibility of our research. Through numerical simulations, we observed that the proposed strategy outperformed the next-best current methodology by 5.561 percent in terms of PSNR Correlation score. Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. Embedding different sizes of a particular secret message in a different image (such as Gray, Texture, Aerial and RGB images) came out with about 5.466 percent of better score.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2022.3224745" target="_blank">https://dx.doi.org/10.1109/access.2022.3224745</a></p>2022-11-24T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2022.3224745https://figshare.com/articles/journal_contribution/A_Novel_Steganography_Technique_for_Digital_Images_Using_the_Least_Significant_Bit_Substitution_Method/24056301CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240563012022-11-24T00:00:00Z |
| spellingShingle | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method Shahid Rahman (16904613) Information and computing sciences Cybersecurity and privacy Data management and data science Graphics, augmented reality and games Steganography Data privacy Error analysis Digital images Current measurement Numerical simulation Robustness Image steganography LSB Image quality assessment metrics Histogram analysis Image Capacity |
| status_str | publishedVersion |
| title | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| title_full | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| title_fullStr | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| title_full_unstemmed | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| title_short | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| title_sort | A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method |
| topic | Information and computing sciences Cybersecurity and privacy Data management and data science Graphics, augmented reality and games Steganography Data privacy Error analysis Digital images Current measurement Numerical simulation Robustness Image steganography LSB Image quality assessment metrics Histogram analysis Image Capacity |