ROI Based Steganography Method Using Two Bit LSB Replacement and Entropy Calculation

Authors

  • Harjeet Kaur  Department of Electronics Engineering, Punjabi University, Patiala, Punjab, India
  • Dr. Amandeep Singh Sappal  Department of Electronics Engineering, Punjabi University, Patiala, Punjab, India

Keywords:

Imperceptibility, Robustness, Steganography, Embedding, Entropy.

Abstract

Different challenges in steganography are Imperceptibility, Robustness and Capacity. In this paper, all these points have been considered and a secure steganography method has been proposed to hide secret information. Self-embedding method has been adopted in which secret information has been taken from the Region of interest selected by a cropping tool. As MSB bits contain most of the information, only MSB bits has been embedded and rest of the LSB bits from the same chosen place can be used for embedding mechanism. Also two bit LSB replacement has been used for embedding data which is decided based on entropy information from a set of non-overlapping blocks of the input image. Maximum entropy has been chosen to select that block first which has maximum value among all. Entropy has been calculated only for MSB bits which results in same sorting sequence of blocks at the receiver side as well hence results in extraction of secret information in the same manner as embedding. XOR embedding has been implemented before embedding in order to secure the data. Proposed method has dual embedding capacity as two bit replacement has been used as compared to the existed method.

References

  1. Mansi S. Subhedara, Vijay H. Mankarb, "Current status and key issues in image steganography: A survey", ScienceDirect, computer science review 13-14 (2014 ) 95 - 113.
  2. Dunbar B. Steganographic techniques and their use in an Open-Systems environment. SANS Institute; January 2002.
  3. Artz D. Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal; June 2001.
  4. Li F , Zhang X , Cheng H , Yu J . Digital image steganalysis based on local textural features and double dimensionality reduction. SecurCommunNetw2014 .
  5. Wang X-T , Li M-C , Wang S-T , Chang C-C  "Reversible data hiding exploiting high-correlation regulation for high-quality images"SecurCommunNetw 2015;8(7):1408-21 .
  6. SubhedarMS ,Mankar VH . Current status and key issues in image steganography: a survey. ComputSci Rev 2014;13:95-113 .
  7. Z. Y. Al-Omari and A. T. Al-Taani, "Secure LSB steganography for colored images using character-color mapping," 2017 8th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 2017, pp. 104-110.
  8. ArefMiri, KarimFaez , " Adaptive image steganography based on transform domain via genetic algorithm " Published in :Optik - International Journal for Light and Electron Optics Volume 145, September 2017, Pages 158-168
  9. Xin Liao , Jiaojiao Yin , SujingGuo , Xiong Li , Arun Kumar Sangaiah , " Medical JPEG image steganography based on preserving inter-block dependencies " Published in : Computers & Electrical Engineering Available online 25 August 2017
  10. P.Malathi, T.Gireeshkumar" Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains " published in : Procedia Computer Science Volume 93, 2016, Pages 878-885
  11. Rao, J.B., Kuna, R.K. and Kasi, M.K., 2015, January "LSB matching steganalysis based on feature analysis approach" In Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on (pp. 1-5). IEEE

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Harjeet Kaur, Dr. Amandeep Singh Sappal, " ROI Based Steganography Method Using Two Bit LSB Replacement and Entropy Calculation, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.61-64, September-October-2017.