scholarly journals Technique of Hiding Information in Image using Least Significant Bit

Author(s):  
Andysah Putera Utama Siahaan

Information hiding is very important because a lot of data theft occurs which can result in significant losses. Data security can be done by hiding information into a media. This media can be in the form of images or sounds. There are several concealment techniques in the picture. In this study, we will discuss the hiding of information in a 24-bit color image which consits of 3 x 8-bit. The method used is Least Significant Bit (LSB). This method is used to insert messages into the 24-bit color image insertion media on every 1 of the most significant bits of each image color. The layers used are Red, Green, and Blue. This method has a small MSE and does not appear to differ if the image is seen directly with the eye. The results of the research show that MSE calculation is not so much different from the original image. Peak Signal to Noise ratio (PSNR) for each image inserted with the maximum message size can produce an average value above 40 dB. This LSB method is excellent to use to provide information in the form of images.

2010 ◽  
Vol 121-122 ◽  
pp. 1048-1051 ◽  
Author(s):  
Sheng Bing Che ◽  
Hai Yang Wang

Based on human visual gray sensitivity, a fragile large capacity spatial domain information hiding algorithm, and a new calculation formula of image peak signal-to-noise ratio were put forward. An adaptive embedding method was proposed, which had the minimum visual gray sensitivity when massive information were hidden into an original image. Experiments showed that this algorithm had massive amount of embedded information and excellent masking properties, and what’s more, once there is a bit tampered randomly, the watermarking image could not be recovered correctly. So it was suitable for the situation where the received information must be very strict reliably.


Author(s):  
KOHEI ARAI

Method for data hiding based on LeGall 5/3 of Cohen-Daubechies-Feauveau: CDF 5/3 wavelet with data compression and random scanning of secret imagery data together with steganography is proposed. Invisibility of secret imagery data is evaluated based on Peak Signal to Noise Ratio: PSNR with SIDBA standard image database. The experimental results show that PSNR of LeGall based wavelet utilized data hiding ranges from 43.82 to 46.9 while that of Daubechies based method ranges from 44.33 to 44.75 when the coded secret imagery data is inserted in the first 3 digits from Least Significant Bit: LSB of the original image. Data compression ratio for the secret imagery data ranges from 1.3 to 19.4 which depends on the complexity of the secret imagery data. Meanwhile, PSNR of data hidden image ranges from 46.83 to 47.41. Consequently, the proposed data hiding method is permissive because PSNR is over 40 dB results in satisfaction on invisibility of the secret imagery data in the data hidden image.


2019 ◽  
Vol 5 (3) ◽  
pp. 255
Author(s):  
Garno Garno ◽  
Riza Ibnu Adam

Maraknya kasus pencurian data menyebabkan sistem keamanan pesan harus ditingkatkan. Salah satu cara untuk mengamankan pesan adalah dengan memasukkan pesan ke dalam gambar digital. Penelitian ini bertujuan untuk meningkatkan kualitas gambar digital dalam sistem keamanan pesan tersembunyi. Teknik yang digunakan untuk keamanan pesan adalah steganografi. Cover image akan dikonversi menjadi bit piksel dalam domain spasial. Cover image digunakan dalam bentuk gambar digital dengan format .jpg. Teknik meningkatkan kualitas dan kapasitas gambar digital dilakukan dengan menambahkan dan meningkatkan bit piksel menggunakan metode interpolasi Cubik B-Spline. Cover image yang telah di interpolasi, kemudian disisipi pesan menggunakan metode least significant bit (LSB) untuk memperoleh stegoimage. Pesan yang diselipkan berbentuk file .doc, .docx, .pdf, .xls, .rar, .iso dan .zip dengan ukuran berbeda-beda kapasitasnya. Teknik uji dibuat dengan bantuan perangkat lunak MATLAB versi 2017a. Penelitian melakukan uji dengan mengukur nilai kualitas penyamaran dari stegoimage menggunakan Peak Signal to Noise Ratio (PSNR) dengan rata-rata perolehan stegoimage terhadap Original image 29.06 dB dan stegoimage terhadap Image interpolation 64.34 dB dan uji mean squared error (MSE) dengan rata-rata perolehan 97.54 dB pada Image interpolation terhadap original image dan 97.55 dB pada stegoimage terhadap original image, 0.13 dB nilai MSE stegoimage terhadap Image interpolation. Hasil uji pada penelitian dengan proses interpolasi pada coverimage dengan Cubic B-Spline mempengaruhi terhadap nilai samar atau Nilai PSNR.


2021 ◽  
Vol 10 (2) ◽  
pp. 689-698
Author(s):  
Jinan N. Shehab ◽  
Hussein A. Abdulkadhim ◽  
Taqwa F.H. Al-Tameemi

This paper contains a robust hiding system proposed to hide and reconstruct efficiently a large size secret image based on merging encrypting and hiding. This approach deals with a video utilized as a cover of frames to hide the blocks of large image inside it. Frames are selected according to 5D hyperchaotic algorithms and consequently change value of the pixel in the original image depends on it. Secret image will divide into many blocks and hide each block in one frame selected by 5D chaotic. This method will support and enhance the techniques of information security with less time and morecapacity of transmission. The results obtained are analyzed under criteria including: Peak signal to noise ratio, Mean square error, key space and sensitivity, correlation coefficient and capacity of hiding. The results demonstrate both of the secret color image and cover video, where retaining its explicitness and properties after reconstruction in the receiver. However, the results prove stability and reliability of the proposed system under several conditions and can avoid attacks.


Information security is an important task on multimedia and communication world. During storing and sharing maintaining a strategic distance from the outsider access of information is the difficult one. There are many encryption algorithms that can provide data security. In this paper two of the encryption algorithms namely AES and RSA are implemented for color images. AES (Advanced Encryption Standard) is a symmetric key block cipher published in December 2001 by NSIT (National Institute of Standards and Technology). RSA (Rivest-Shamir-Adleman) is an asymmetric key block cipher. It uses two separate keys, one for encryption called the public key and other for decryption called the private key. Both the implementation and analysis are done in Matlab. The quality and security level of both the algorithms is analysed based on various criteria such as Histogram analysis, Correlation analysis, Entropy analysis, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity), PSNR (Peak Signal-to-Noise Ratio).


2016 ◽  
Vol 7 (3) ◽  
pp. 1-9 ◽  
Author(s):  
Sahar A. El-Rahman Ismail ◽  
Dalal Al Makhdhub ◽  
Amal A. Al Qahtani ◽  
Ghadah A. Al Shabanat ◽  
Nouf M. Omair ◽  
...  

We live in an information era where sensitive information extracted from data mining systems is vulnerable to exploitation. Privacy preserving data mining aims to prevent the discovery of sensitive information. Information hiding systems provide excellent privacy and confidentiality, where securing confidential communications in public channels can be achieved using steganography. A cover media are exploited using steganography techniques where they hide the payload's existence within appropriate multimedia carriers. This paper aims to study steganography techniques in spatial and frequency domains, and then analyzes the performance of Discrete Cosine Transform (DCT) based steganography using the low frequency and the middle frequency to compare their performance using Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE). The experimental results show that middle frequency has the larger message capacity and best performance.


2020 ◽  
Vol 19 (03) ◽  
pp. 2050027
Author(s):  
Thandar Oo ◽  
Pornchai Phukpattaranont

When electromyography (EMG) signals are collected from muscles in the torso, they can be perturbed by the electrocardiography (ECG) signals from heart activity. In this paper, we present a novel signal-to-noise ratio (SNR) estimate for an EMG signal contaminated by an ECG signal. We use six features that are popular in assessing EMG signals, namely skewness, kurtosis, mean average value, waveform length, zero crossing and mean frequency. The features were calculated from the raw EMG signals and the detail coefficients of the discrete stationary wavelet transform. Then, these features are used as inputs to a neural network that outputs the estimate of SNR. While we used simulated EMG signals artificially contaminated with simulated ECG signals as the training data, the testing was done with simulated EMG signals artificially contaminated with real ECG signals. The results showed that the waveform length determined with raw EMG signals was the best feature for estimating SNR. It gave the highest average correlation coefficient of 0.9663. These results suggest that the waveform length could be deployed not only in EMG recognition systems but also in EMG signal quality measurements when the EMG signals are contaminated by ECG interference.


Symmetry ◽  
2020 ◽  
Vol 12 (3) ◽  
pp. 486
Author(s):  
Pranab Kumar Dhar ◽  
Pulak Hazra ◽  
Tetsuya Shimamura

Digital watermarking has been utilized effectively for copyright protection of multimedia contents. This paper suggests a blind symmetric watermarking algorithm using fan beam transform (FBT) and QR decomposition (QRD) for color images. At first, the original image is transferred from RGB to L*a*b* color model and FBT is applied to b* component. Then the b*component of the original image is split into m × m non-overlapping blocks and QRD is conducted to each block. Watermark data is placed into the selected coefficient of the upper triangular matrix using a new embedding function. Simulation results suggest that the presented algorithm is extremely robust against numerous attacks, and also yields watermarked images with high quality. Furthermore, it represents more excellent performance compared with the recent state-of-the-art algorithms for robustness and imperceptibility. The normalized correlation (NC) of the proposed algorithm varies from 0.8252 to 1, the peak signal-to-noise ratio (PSNR) varies from 54.1854 to 54.1892, and structural similarity (SSIM) varies from 0.9285 to 0.9696, respectively. In contrast, the NC of the recent state-of-the-art algorithms varies from 0.5193 to 1, PSNR varies from 38.5471 to 52.64, and SSIM varies from 0.9311 to 0.9663, respectively.


2018 ◽  
Vol 18 (1) ◽  
pp. 69-80 ◽  
Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain ◽  
E. Suresh Babu

Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs of the pixels to hide secret information in it. It exists in two variants. Variant-1 and Variant-2 both use 7th and 8th bit of a pixel to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the Variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, Peak Signal to Noise Ratio (PSNR), hiding capacity, and the Quality Index (Q.I) of the proposed techniques has been compared with the results of the existing bit flipping technique and some of the state of art article.


Sign in / Sign up

Export Citation Format

Share Document