A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method

<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. Every communication body wants to secure thei...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Shahid Rahman (16904613) (author)
مؤلفون آخرون: Jamal Uddin (2037424) (author), Habib Ullah Khan (12024579) (author), Hameed Hussain (15138547) (author), Ayaz Ali Khan (13902882) (author), Muhammad Zakarya (16904616) (author)
منشور في: 2022
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513560906825728
author Shahid Rahman (16904613)
author2 Jamal Uddin (2037424)
Habib Ullah Khan (12024579)
Hameed Hussain (15138547)
Ayaz Ali Khan (13902882)
Muhammad Zakarya (16904616)
author2_role author
author
author
author
author
author_facet Shahid Rahman (16904613)
Jamal Uddin (2037424)
Habib Ullah Khan (12024579)
Hameed Hussain (15138547)
Ayaz Ali Khan (13902882)
Muhammad Zakarya (16904616)
author_role author
dc.creator.none.fl_str_mv Shahid Rahman (16904613)
Jamal Uddin (2037424)
Habib Ullah Khan (12024579)
Hameed Hussain (15138547)
Ayaz Ali Khan (13902882)
Muhammad Zakarya (16904616)
dc.date.none.fl_str_mv 2022-11-24T00:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2022.3224745
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/A_Novel_Steganography_Technique_for_Digital_Images_Using_the_Least_Significant_Bit_Substitution_Method/24056301
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Data management and data science
Graphics, augmented reality and games
Steganography
Data privacy
Error analysis
Digital images
Current measurement
Numerical simulation
Robustness
Image steganography
LSB
Image quality assessment metrics
Histogram analysis
Image
Capacity
dc.title.none.fl_str_mv A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. Various techniques used for secure communication in order to address these issues, steganography plays an important role. Steganography is the process of obfuscation that makes something incomprehensible and unclear. Different image steganography research methods are proposed recently but each has their advantages and disadvantages and still have necessity to develop some better image steganography mechanisms to achieve the reliability between the basics criteria of image steganography. Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. The experimental outcomes of the suggested approach prove further developed strength and justify the feasibility of our research. Through numerical simulations, we observed that the proposed strategy outperformed the next-best current methodology by 5.561 percent in terms of PSNR Correlation score. Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. Embedding different sizes of a particular secret message in a different image (such as Gray, Texture, Aerial and RGB images) came out with about 5.466 percent of better score.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2022.3224745" target="_blank">https://dx.doi.org/10.1109/access.2022.3224745</a></p>
eu_rights_str_mv openAccess
id Manara2_66b4eaac4e0984c23aac9ad83e49b251
identifier_str_mv 10.1109/access.2022.3224745
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24056301
publishDate 2022
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution MethodShahid Rahman (16904613)Jamal Uddin (2037424)Habib Ullah Khan (12024579)Hameed Hussain (15138547)Ayaz Ali Khan (13902882)Muhammad Zakarya (16904616)Information and computing sciencesCybersecurity and privacyData management and data scienceGraphics, augmented reality and gamesSteganographyData privacyError analysisDigital imagesCurrent measurementNumerical simulationRobustnessImage steganographyLSBImage quality assessment metricsHistogram analysisImageCapacity<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. Various techniques used for secure communication in order to address these issues, steganography plays an important role. Steganography is the process of obfuscation that makes something incomprehensible and unclear. Different image steganography research methods are proposed recently but each has their advantages and disadvantages and still have necessity to develop some better image steganography mechanisms to achieve the reliability between the basics criteria of image steganography. Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. The experimental outcomes of the suggested approach prove further developed strength and justify the feasibility of our research. Through numerical simulations, we observed that the proposed strategy outperformed the next-best current methodology by 5.561 percent in terms of PSNR Correlation score. Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. Embedding different sizes of a particular secret message in a different image (such as Gray, Texture, Aerial and RGB images) came out with about 5.466 percent of better score.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2022.3224745" target="_blank">https://dx.doi.org/10.1109/access.2022.3224745</a></p>2022-11-24T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2022.3224745https://figshare.com/articles/journal_contribution/A_Novel_Steganography_Technique_for_Digital_Images_Using_the_Least_Significant_Bit_Substitution_Method/24056301CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240563012022-11-24T00:00:00Z
spellingShingle A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Shahid Rahman (16904613)
Information and computing sciences
Cybersecurity and privacy
Data management and data science
Graphics, augmented reality and games
Steganography
Data privacy
Error analysis
Digital images
Current measurement
Numerical simulation
Robustness
Image steganography
LSB
Image quality assessment metrics
Histogram analysis
Image
Capacity
status_str publishedVersion
title A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
title_full A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
title_fullStr A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
title_full_unstemmed A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
title_short A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
title_sort A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
topic Information and computing sciences
Cybersecurity and privacy
Data management and data science
Graphics, augmented reality and games
Steganography
Data privacy
Error analysis
Digital images
Current measurement
Numerical simulation
Robustness
Image steganography
LSB
Image quality assessment metrics
Histogram analysis
Image
Capacity