PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Payload Enhancement on Least Significant Bit Image Steganography Using Edge Area Dilation

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This research proposes a method to enhance the payload message by embedding messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add security aspects to messages, messages are not embedded directly on the LSB but encrypted with XOR operations with Most Significant Bit (MSB). The experimental results of the test in this study showed that the dilation process to some extent can increase the payload of 18.65% and the average bpp is 1.42 while maintaining the imperceptibilty quality of stego image with an average PSNR value of about 47 dB, SSIM is 0.9977 and MSE is 1.13.
Słowa kluczowe
Twórcy
  • Department of Informatics Engineering, Dian Nuswantoro University, Indonesia
Bibliografia
  • [1] K. M. Kordov and B. Stoyanov, "Least Significant Bit Steganography using Hitzl-Zele Chaotic Map," International Journal of Electronics and Telecommunications, vol. 63, no. 4, pp. 417-422, 2017.
  • [2] S. Islam, M. R. Modi, and P. Gupta, "Edge-based Image Steganography," EURASIP Journal on Information Security, vol. 2014, no. 1, 2014.
  • [3] A. K. Sahu, G. Swain and E. S. Babu, "Digital Image Steganography Using Bit Flipping," Cybernetics and Information Technologies, vol. 18, no. 1, pp. 69-80, 2018.
  • [4] D. R. I. M. Setiadi and J. Jumanto, "An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection," Cybernetics and Information Technologies, vol. 18, no. 2, 2018 in Press.
  • [5] W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi and C. A. Sari, "A Good Performance OTP Encryption Image based on DCT-DWT Steganography," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 15, no. 4, pp. 1987-1995, 2017.
  • [6] A. K. Sahu and G. Swain, "An Improved Data Hiding Technique Using Bit Differencing and LSB Matching," Internetworking Indonesia Journal, vol. 10, no. 1, pp. 17-21, 2018.
  • [7] N. Jain, S. Meshram, and S. Dubey, "Image Steganography Using LSB and Edge – Detection Technique," International Journal of Soft Computing and Engineering, vol. 2, no. 3, pp. 217-222, 2012.
  • [8] W. Wang, J. Ye, T. Wang and W. Wang, "Reversible data hiding scheme based on significant-bit-difference expansion," IET Image Processing, vol. 11, no. 11, pp. 1002-1014, 2017.
  • [9] E. H. Rachmawanto, R. S. Amin, D. R. I. M. Setiadi and C. A. Sari, "A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size," in International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, 2017.
  • [10] E. J. Kusuma, O. R. Indriani, C. A. Sari, E. H. Rachmawanto and D. R. I. M. Setiadi, "An imperceptible LSB image hiding on edge region using DES encryption," in International Conference on Innovative and Creative Information Technology (ICITech), Salatiga, 2017.
  • [11] C. Irawan, D. R. I. M. Setiadi, C. A. Sari and E. H. Rachmawanto, "Hiding and securing message on edge areas of image using LSB steganography and OTP encryption," in International Conference on Informatics and Computational Sciences (ICICoS), Semarang, 2017.
  • [12] W. Luo, F. Huang, and J. Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited," IEEE Transactions on Information Forensics And Security, vol. 5, no. 2, pp. 201-214, 2010.
  • [13] M. Nikolic, E. Tuba, and M. Tuba, "Edge Detection in Medical Ultrasound Images Using Adjusted Canny Edge Detection Algorithm," in Telecommunications Forum (TELFOR), Belgrade, 2016.
  • [14] P. Kaur and B. Kaur, "2-D Geometric Shape Recognition using Canny Edge Detection Technique," in International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016.
  • [15] E. Ortiz, K. W. Bowyer, and P. J. Flynn, "An optimal strategy for dilation based iris image enrollment," in IEEE International Joint Conference on Biometrics, Clearwater, 2014.
  • [16] Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, "Simple and secure image steganography using LSB and triple XOR operation on MSB," in International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, 2018.
  • [17] R. Singh, P. Rawat, and P. Shukla, "Robust medical image authentication using 2-D stationary wavelet transform and edge detection," in IET International Conference on Biomedical Image and Signal Processing (ICBISP), Wuhan, 2017.
  • [18] R. Mukherjee, A. Pundir, D. Mahato, G. Bhandari and G. J. Saxena, "A robust algorithm for morphological, spatial image-filtering and character feature extraction and mapping employed for vehicle number plate recognition," in International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, 2017.
  • [19] R. C. Gonzalez, R. E. Woods and S. L. Eddins, Digital Image Processing Using Matlab, Gatesmark Publishing, 2009.
  • [20] T. S. Le, V. N. Tran, and K. Hamamoto, "A robust and flexible license plate detection method," in International Conference on Advanced Technologies for Communications (ATC), Hanoi, 2014.
  • [21] C. A. Sari, E. H. Rachmawanto, and D. R. I. M. Setiadi, "Robust and imperceptible image watermarking by DC coefficients using singular value decomposition," in International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, 2017.
  • [22] S. Bhattacharyya, S. Mondal, and G. Sanyal, "A Robust Image Steganography using Hadamard Transform," in International Conference on Information Technology in Signal and Image Processing, Mumbai, 2013.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-86597a25-5b89-475f-8eda-80d023f094ae
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.