Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority

Adnan Abdul-Aziz Gutub, Nouf Al-Juaid

Abstract


Security system for hiding sensitive text-data on personal computer (PC) is implemented. The system proposes using normal multimedia image based steganography replacing the pixel least significant bits with text to be hidden. The study involved several testing scenarios for possible increase in the capacity and ambiguity within steganography adopting 1, 2, 3 and 4 least significant bits stego-systems choices. The design novelty is in providing full security information to the user to select appropriate cover-image from the PC based on the security priority. The technique allows the PC user to test multi-bits steganography on several images to hide same sensitive texts. Then, the user can prefer one image to be used as cover image based on his selection knowing the capacity and security priority desired. The study proofs the data dependency and its security property by experimenting 35 fixed sizes PC images showing remarkable results.

 


Full Text:

PDF

References


N. Al-Otaibi, A. Gutub, "2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers," Lecture Notes on Information Theory, Engineering and Technology Publishing, vol. 2, no. 2, pp. 151-157, June 2014.

V. Tyagi, "Data Hiding in Image using least significant bit with cryptography," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 4, pp. 120-123, April 2012.

K. Patel, S. Vishwakarma, H. Gupta, "Triple Security of Information Using Steganography and Cryptography," International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 10, pp. 642-646, October 2013.

K. Patel, S. Utareja, H. Gupta, "A Survey of Information Hiding Techniques," IJETAE, vol. 3, no. 1, pp. 347-350, January 2013.

M. Hussain, M. Hussain, "A Survey of Image Steganography Techniques," International Journal of Advanced Science and Technology, vol. 45, pp. 113-124, May 2013.

Kavitha, K. Kadam, A. Koshti, P. Dunghav, "Steganography Using Least Signicant Bit Algorithm," International Journal of Engineering Research and Applications (IJERA), vol. 2, no. 3, pp. 338-341, May 2012.

D. Bloisi, L. Iocchi, "Image based Steganography and Cryptography," Computer Vision theory and applications, vol. 1, pp. 127-134, 2007.

V. Jain, L. Kumar, M. Sharma, M. Sadiq, K. Rastogi, "Public-Key Steganography Based on Matching Method," Journal of Global Research in Computer Science,vol. 3, no. 4, pp. 26-29, April 2012.

K. Harshitha, P. Vijaya, "Secure Data Hiding Algorithm Using Encrypted Secret Message," IJSRP, vol. 2, no. 6, June 2012.

S. Gupta, A. Goyal, B. Bhushan, "Information Hiding Using Least Significant Bit Steganography and Cryptography," International Journal Modern Education and Computer Science, vol. 6, no. 1, pp. 27-34, June 2012.

J. Nath, A. Nath, "Advanced Steganography Algorithm using Encrypted Secret Message," International Journal of Advanced Computer Science and Applications, vol. 2, no. 3, pp. 19-24, March 2011.

A. Nath, S. Ghosh, M. Mallik, "Symmetric key cryptography using random key generator," Proceedings of International conference on SAM-2010, vol. 2, pp. 239-244, Las Vegas (USA), July 2010.


Refbacks

  • There are currently no refbacks.




Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.