İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması

İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması

Digital image steganography techniques deal with three subjects lossy/lossless compressed images, uncompressed images. Steganography techniques embed secret data pixel directly into uncompressed and lossless compressed cover images. The most popular data hiding method is, changing pixels’ left most digits or last two, known as Least Significant Bit (LSB). Lossless image formats like .bmp, .png, and 8-bit gray-scale .gif are usable for LSB methods. LSB embedding method is not usable for palette images because of changing just last bit of a pixel causes a big difference on image. After embedding all of secret message to palette image, Human Visual System (HVS) can detect manipulations on image. In this study, we compare some of the most popular LSB techniques; Chan’s algorithm [3], 2/3 efficient embedding [4], matrix embedding for large payloads [5], image blocks method [6] and pixel-value differencing method [7]-[8].

___

  • 1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78.
  • [2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287.
  • [3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59.
  • [4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013.
  • [5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738.
  • [6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118.
  • [7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626.
  • [8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158.
  • [9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172.
  • [10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78.
  • [11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755.
  • [12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000.
  • [13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80.
  • [14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007.
  • [15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4.
  • [16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241.
  • [17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95.