Information Security through an Improved Image Steganography Algorithm

Authors

  • Elsie Wangui Ngatia KCA University
  • Dr. Alice Njuguna KCA University

Abstract

Steganography is the data hiding technique which allows hiding secret message or image within a larger image or message such that the hidden message or an image is undetectable. It is a very useful method for secret information transmission. This research proposed security of information through an image hiding steganographic method, of hiding an image within a cover image. This steganographic method aims to minimize the visually obvious and numerical differences between the cover image and a stego image with increase in the size of the payload. The proposed improved algorithm uses the binary codes which is the binary representation of pixels inside the image. This algorithm  make use of improved  least significant bit (LSB) technique, which is a popular technique in steganography ,in which  least significant bits of cover are altered by secret data bits. The proposed method integrates randomization algorithm which improve the security of LSB scheme.  The bits of the secret image are embedded in random pixels of the cover image. The method enhances the security of the LSB technique by randomly dispersing the bits of secret image in the cover image which makes it harder for unauthorized people to extract the original image. Since all the secret image bits are embedded in the cover image the exact secret image can be regenerated from the stego-image and thereby the image quality is preserved by the system. The research implements steganography for images, with an improvement in both security and image quality.

 

Keywords: Information security, Image, Steganography and Algorithm

Author Biographies

Elsie Wangui Ngatia, KCA University

Postgraduate Student

Dr. Alice Njuguna, KCA University

Lecturer

References

Amirthajan, R. A. (2010). A comparative Analysis of image steganography. International journal of computer application, 2(3), 2-10.

Arora, P. R. (2015). Image Security System using Encryption and Steganography. International Journal of Innovative Research in Science, iv(06).

Ashiwini B, P. S. (2014). A hybrid approach for enhancing data security by combining encryption and steganography . Proceedings of the international conference on advances in engineering and Technology.

Atallah M. Al-Shatnawi. A (2012) New Method in Image Steganography with Improved image Quality.Journal ofApplied Mathematical Sciences, Vol. 6, No. 79, pp. 3907-3915,

Cox I.J, Miller J.M, & loom J. A. B (2002), Digital Watermarking. Morgan Kaufmann.

El-Hoby, H. M., Salah, M. A. F, & Suhaimi, M. A. (2014). Aligning Cloud Computing Security with Business Strategy. International Journal of Computer Trends and

Ettinger M (1998) “Steganalysis and game equilibria,” in Information Hiding, 2nd international Workshop (D. Aucsmith, ed.), Lecture Notes in Computer Science, pp. 319–328, Springer.

Feldman, A. J. (2012). Privacy and integrity in the untrusted cloud. Mountain View, California, USA.

Grgic, M. (2001). Perfomance Analysis of image Compression using Wavelets. ITIE , 48 (3), 682- 695.

GundaSai Charnl, N. K. (2015). A Novel LSB based image steganography with multi level encryption. 2nd International Conference on innovations in information embedded and communication systems.

International Conference on Issues and Challenges in intelligent Computing techniques.

International Journal Of Computer Science and Mobile Computing , 3 (5), 804-808.

International Journal of Engineering Trends and Technology , 3 (3).

Jajodia, N. J. (1998). Exploring Steganography: Seeing the unseeen. IEEE Computer, 26-34.

Karam, J. (2008). A New Approach in Wavelet Based Speech Compression. Mathematical Methods, Computational Techniques, Non Linear Systems, Intelligent Systems, 228-233.

Kumar R.P, Hemanth V.,(2015) “Securing Information Using Sterganoraphy” International Conference on Circuits, Power and Computing Technologies (ICCPCT), page(s): 1197 – 1200.

Maconanchy, C. S. (2001). A model for Information Assurance: An Intergrated Approach. Proceedings of the 2001 IEEE Workshop on Information Assurance and security. New York: U.S. Military Academy.

Meyyappan, R. N. (2012). Image Security using steganograpahy and cryptographic techniques.

Morkel, O. S. (2005). An Overview of Image Steganography. Proceeding of the 5th annual information security. South Africa.

Natasha T, D. P. (2015). Dual security: Proposed architecture. International Journal of science, technology and Management , iv (02).

Pattewar, V. A. (2014). A novel Approach towards separable Reversible Data Hiding Techniques.

Prabakaran G, Bhavani R., Rajeswari P.S (2013), “Multi secure and robustness for medical image based steganography scheme” International Conference on Circuits, Power and Computing Technologies (ICCPCT), 1188 – 1193

Preet, R. G. (2014). A new proposed Practice for secure Image combining Cryptography, steganography and watermarking based on vaious parameters. International Conference on contemporary computing and informatics.

Rajkumar Y, Ravi S, and Kamaldeep. C (2011) Combination Method for Digital Image steganography with Uniform Distribution of Message. An International Journal on advanced Computing (ACIJ), Vol. 2, No. 6, pp. 29-43, November 2011.

Rashedul, A. S. (2014). An efficient filtering based approach improving LSB Image steganography using status bit along with AES cryptography. 3rd International Conference on Informatics, Electronics & Vision.

Rengarajan A. Anushiadevi M. Kalpana D. & ohn B.B (2012) “Seeable Visual But not Sure of It” IEEE-International Conference on Advances in Engineering, Science And management.

Soni, P. B. (2012). A New approach of data hiding in images using cryptography and steganography. International journal of computer application , 58 (18).

Tanuja, B. K. (2014). Enhance Two Tier Secure Model of Modern Image Steganography. Technology (IJCTT)

Yung-Chen, C.-H. &. (2008). Digital invisible ink data hiding based on spread spectrum and quantization techniques. IEEE transactions on multimedia, 10(4).

Zoran D., Michael J., and Sushil J. (2010) Information Hiding: Steganography and steganalysis. Review Article Handbook of Statistics, Vol. 24, pp. 171-187, Katzenbeisser S.and Petitcolas F. A. P. (2010) Information Hiding Techniques for steganography and Digital Watermarking. Artech House Inc.

Downloads

Published

2018-01-05

How to Cite

Ngatia, E. W., & Njuguna, D. A. (2018). Information Security through an Improved Image Steganography Algorithm. Journal of Information, Technology and Data Science, 1(1), 28–45. Retrieved from https://stratfordjournalpublishers.org/journals/index.php/Journal-of-Information-and-Techn/article/view/103

Issue

Section

Articles