Contact Us Search Paper

A Least Significant Bit Steganographic Method Using Hough Transform Technique

Dalia Nashat1,*, and Loay Mamdouh2

Corresponding Author:

Dalia Nashat

Affiliation(s):

1 Faculty of Computers and Information, Assuit University, Assuit, Egypt

2 Hurghada Faculty of Computers & Artificial Intelligence, South Valley University, Hurghada, Egypt

*Corresponding author

Abstract:

Steganography is a data-hiding scientific branch that aims to hide secret data in an image, video, or audio. Image steganography methods try to embed a large amount of data into images with high imperceptibility. However, increasing the number of embedded data in the image decreases its quality. Therefore, in this paper, a new method based on Least Significant Bit (LSB) using Hough Transform is proposed to improve the stego image quality with increasing the amount of embedded data. The LSB is the common embedding steganography method due to its simplicity of implementation and low complexity. The proposed method inverts the LSBs of image pixels to enhance the quality of stego image. First, improved edge detection filter is used to detect edges areas. Then, we invert LSBs for the pixel in edge area pixels. Finally, the LSBs smooth area pixels of the cover image are inverted. The performance of the presented method is evaluated for the stego image quality and the amount of embedded data. The results show that the new method has better performance in comparison with the current methods in terms of Peak Signal-to-Noise Ratio (PSNR) and capacity.

Keywords:

Information security, Image processing, Steganography, Data hiding, LSB, Hough Transform

Downloads: 82 Views: 373
Cite This Paper:

Dalia Nashat, and Loay Mamdouh (2023). GFS-CNN: A GPU-friendly Secure Computation Platform for Convolutional Neural Networks. Journal of Networking and Network Applications, Volume 3, Issue 2, pp. 73–80. https://doi.org/10.33969/J-NaNA.2023.030203.

References:

[1] W. S. Sari, E. H. Rachmawanto, C. A. Sari, et al., “A good per-formance otp encryption image based on dct-dwt steganography,” Telkomnika, vol. 15, no. 4, pp. 1987–1995, 2017.

[2] R. D. Ardy, O. R. Indriani, C. A. Sari, E. H. Rachmawanto, et al., “Digital image signature using triple protection cryptosystem (rsa, vigenere, and md5),” in Smart Cities, Automation & Intelligent Com-puting Systems (ICON-SONICS), 2017 International Conference on, pp. 87–92, IEEE, 2017.

[3] A. Winarno, D. Setiadi, A. Arrasyid, C. Sari, and E. Rachmawanto, “Image watermarking using low wavelet subband based on 8× 8 sub-block dct,” in International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, 2017.

[4] L. Kothari, R. Thakkar, and S. Khara, “Data hiding on web using com-bination of steganography and cryptography,” in Computer, Commu-nications and Electronics (Comptelix), 2017 International Conference on, pp. 448–452, IEEE, 2017.

[5] G. Ardiansyah, C. A. Sari, E. H. Rachmawanto, et al., “Hybrid method using 3-des, dwt and lsb for secure image steganography algorithm,” in Information Technology, Information Systems and Electrical Engineer-ing (ICITISEE), 2017 2nd International conferences on, pp. 249–254, IEEE, 2017.

[6] Y. P. Astuti, E. De Rosal Ignatius Moses Setiadi, H. Rachmawanto, and C. A. Sari, “Simple and secure image steganography using lsb and triple xor operation on msb,”

[7] G. Chugh, “Image steganography techniques: A review article.,” Acta Technica Corvininesis-Bulletin of Engineering, vol. 6, no. 3, 2013.

[8] B. Yang and B. Deng, “Steganography in gray images using wavelet,” Proceedings of ISCCSP, 2006.

[9] A. Setyono et al., “Stegocrypt method using wavelet transform and one-time pad for secret image delivery,” in Information Technology, Computer, and Electrical Engineering (ICITACEE), 2017 4th Interna-tional Conference on, pp. 203–207, IEEE, 2017.

[10] A. U. Islam, F. Khalid, M. Shah, Z. Khan, T. Mahmood, A. Khan,

U. Ali, and M. Naeem, “An improved image steganography technique based on msb using bit differencing,” in Innovative Computing Tech-nology (INTECH), 2016 Sixth International Conference on, pp. 265–269, IEEE, 2016.

[11] E. H. Rachmawanto, C. A. Sari, et al., “A performance analysis stegocrypt algorithm based on lsb-aes 128 bit in various image size,” in Application for Technology of Information and Communication (iSemantic), 2017 International Seminar on, pp. 16–21, IEEE, 2017.

[12] D. R. I. M. Setiadi, “Improved payload capacity in lsb image steganog-raphy uses dilated hybrid edge detection,”

[13] R. Bhardwaj and V. Sharma, “Image steganography based on comple-mented message and inverted bit lsb substitution,” Procedia Computer Science, vol. 93, pp. 832–838, 2016.

[14] N. Akhtar, S. Khan, and P. Johri, “An improved inverted lsb image steganography,” in IEEE International Conference on Issues and challenges in Intelligent Computing techniques (ICICT), pp. 7–8, 2014.

[15] M. A. Majeed and R. Sulaiman, “An improved lsb image steganog-raphy technique using bit-inverse in 24 bit colour image.,” Journal of Theoretical & Applied Information Technology, vol. 80, no. 2, 2015.

[16] M. Juneja and P. S. Sandhu, “A new approach for information hiding in color images using adaptive steganography and hybrid feature detection with improved psnr and capacity,” International Journal of Engineering and Technology (IJET), vol. 5, no. 2, pp. 1853–1862, 2013.

[17] S. Singh and A. Datar, “Improved hash based approach for secure color image steganography using canny edge detection method,” International Journal of Computer Science and Network Security (IJCSNS), vol. 15, no. 7, p. 92, 2015.

[18] F. U. Mangla, S. Nokhaiz, M. Ramzan, and I. U. Lali, “A novel steganography technique using grayscale image segmentation,” Inter-national Journal of Advanced and Applied Sciences, vol. 6, no. 5, pp. 84–91, 2019.

[19] Y. M. Abdalnour, A. S. Huwedi, and K. A. Bozed, “Image steganog-raphy approach based on straight line detection,” in Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2016 17th International Conference on, pp. 317–327, IEEE, 2016.

[20] A. Nejahi and F. Z. Boroujeni, “The improvement of steganography function based on the least significant bit in rgb color,” American Journal of Software Engineering and Applications, vol. 5, no. 3-1, pp. 1–4, 2016.

[21] D. K. Nayak and C. Bhagvati, “A threshold-lsb based information hiding scheme using digital images,” in Computer and Communication Technology (ICCCT), 2013 4th International Conference on, pp. 269–272, IEEE, 2013.

[22] K. Joshi and R. Yadav, “A new lsb-s image steganography method blend with cryptography for secret communication,” in Image Infor-mation Processing (ICIIP), 2015 Third International Conference on, pp. 86–90, IEEE, 2015.

[23] K. Joshi and R. Yadav, “New approach toward data hiding using xor for image steganography,” in Contemporary Computing (IC3), 2016 Ninth International Conference on, pp. 1–6, IEEE, 2016.

[24] D. Nashat and L. Mamdouh, “An efficient steganographic technique for hiding data,” Journal of the Egyptian Mathematical Society, vol. 27, pp. 1–14, 2019.

[25] P. Maniriho and T. Ahmad, “Information hiding scheme for digital images using difference expansion and modulus function,” Journal of king saud university-computer and information sciences, vol. 31, no. 3, pp. 335–347, 2019.

[26] A. Karawia, “Medical image steganographic algorithm via modified lsb method and chaotic map,” IET Image Processing, vol. 15, no. 11, pp. 2580–2590, 2021.

[27] M. Hashim, M. S. MOHD RAHIM, and A. A. ALWAN, “A review and open issues of multifarious image steganography techniques in spatial domain.,” Journal of Theoretical & Applied Information Technology, vol. 96, no. 4, 2018.

[28] Z. N. Al-Kateeb, M. J. Al-Shamdeen, and F. S. Al-Mukhtar, “En-cryption and steganography a secret data using circle shapes in colored images,” in Journal of Physics: Conference Series, vol. 1591,

p. 012019, IOP Publishing, 2020.

[29] A. Zenati, W. Ouarda, and A. M. Alimi, “A new digital steganography system based on hiding online signature within document image data in yuv color space,” Multimedia Tools and Applications, vol. 80, pp. 18653–18676, 2021.

[30] M. S. Taha, M. S. M. Rahem, M. M. Hashim, and H. N. Khalid, “High payload image steganography scheme with minimum distortion based on distinction grade value method,” Multimedia Tools and Applications, vol. 81, no. 18, pp. 25913–25946, 2022.

[31] A. K. Sahu and G. Swain, “High fidelity based reversible data hiding using modified lsb matching and pixel difference,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 4, pp. 1395–1409, 2022.

[32] H.-W. Tseng and H.-S. Leng, “A reversible modified least significant bit (lsb) matching revisited method,” Signal Processing: Image Com-munication, vol. 101, p. 116556, 2022.

[33] P. V. Hough, “Method and means for recognizing complex patterns,” Dec. 18 1962. US Patent 3,069,654.

[34] P. Mukhopadhyay and B. B. Chaudhuri, “A survey of hough trans-form,” Pattern Recognition, vol. 48, no. 3, pp. 993–1010, 2015.

[35] M. Rizon, Y. Haniza, S. Puteh, A. Yeon, M. Shakaff, S. Abdul Rah-man, M. Sugisaka, Y. Sazali, M. M Rozailan, and M. Karthigayan, “Object detection using circular hough transform,” 2005.

[36] R. K. Murmu and M. Jhaniya, Image Segmentation Using Hough Transform. PhD thesis, 2009.

[37] C.-K. Chan and L.-M. Cheng, “Hiding data in images by simple lsb substitution,” Pattern recognition, vol. 37, no. 3, pp. 469–474, 2004.

[38] N.-I. Wu and M.-S. Hwang, “Data hiding: current status and key issues.,” IJ Network Security, vol. 4, no. 1, pp. 1–9, 2007.

[39] M. H. Mohamed and L. M. Mohamed, “High capacity image steganog-raphy technique based on lsb substitution method,” Applied Mathemat-ics & Information Sciences, vol. 10, no. 1, p. 259, 2016.

[40] M. Juneja and P. S. Sandhu, “Performance evaluation of edge detection techniques for images in spatial domain,” International journal of computer theory and Engineering, vol. 1, no. 5, p. 614, 2009.

[41] C.-C. Chang, Y.-C. Chou, and T. D. Kieu, “Information hiding in dual images with reversibility,” in Multimedia and Ubiquitous Engineering, 2009. MUE’09. Third International Conference on, pp. 145–152, IEEE, 2009.