Open Access   Article Go Back

Enhancement of Efficiency in LSB Steganography Method Using Matrix Multiplication

Tanu Garg1 , Kamaldeep Joshi2 , Jyoti Pandey3 , Harkesh Sehrawat4 , Rainu Nandal5

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1267-1278, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.12671278

Online published on Jun 30, 2018

Copyright © Tanu Garg, Kamaldeep Joshi, Jyoti Pandey, Harkesh Sehrawat, Rainu Nandal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Tanu Garg, Kamaldeep Joshi, Jyoti Pandey, Harkesh Sehrawat, Rainu Nandal, “Enhancement of Efficiency in LSB Steganography Method Using Matrix Multiplication,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1267-1278, 2018.

MLA Style Citation: Tanu Garg, Kamaldeep Joshi, Jyoti Pandey, Harkesh Sehrawat, Rainu Nandal "Enhancement of Efficiency in LSB Steganography Method Using Matrix Multiplication." International Journal of Computer Sciences and Engineering 6.6 (2018): 1267-1278.

APA Style Citation: Tanu Garg, Kamaldeep Joshi, Jyoti Pandey, Harkesh Sehrawat, Rainu Nandal, (2018). Enhancement of Efficiency in LSB Steganography Method Using Matrix Multiplication. International Journal of Computer Sciences and Engineering, 6(6), 1267-1278.

BibTex Style Citation:
@article{Garg_2018,
author = {Tanu Garg, Kamaldeep Joshi, Jyoti Pandey, Harkesh Sehrawat, Rainu Nandal},
title = {Enhancement of Efficiency in LSB Steganography Method Using Matrix Multiplication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1267-1278},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2339},
doi = {https://doi.org/10.26438/ijcse/v6i6.12671278}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.12671278}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2339
TI - Enhancement of Efficiency in LSB Steganography Method Using Matrix Multiplication
T2 - International Journal of Computer Sciences and Engineering
AU - Tanu Garg, Kamaldeep Joshi, Jyoti Pandey, Harkesh Sehrawat, Rainu Nandal
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1267-1278
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
637 448 downloads 236 downloads
  
  
           

Abstract

The quick progression in the trading of data through internet made it simpler to trade information correct and quickest to the receiver. The security of information is one of the immense parts of information technology and communication. Steganography is a term utilized for data hiding and it is a craft of concealed written work. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. Thus, the observers can`t locate the concealed data which we need to send to the recipient. Steganography principle objective is to give robustness, imperceptibility, and limit of hiding information because of which it contrasts from different methods, for example, watermarking and cryptography. In image steganography we shroud our secret information in image with the goal that the observer can`t feel its reality. Image steganography procedures are starting late been valuable to send any secret message in the secured image carrier to foresee dangers and assaults, however, it doesn`t give any kind of chance to programmers to discover the secret technique. Image steganography is efficient and better type than other types of steganography. The LSB method also faces the same challenge regarding the selection of which bits are used for hiding the data without effect the actual image pixels. This paper proposes a new technique used to hide information by image steganography using matrix multiplication in which we pick 6th , 7th , 8th bit of image pixel and add our message with it by applying some techniques and resultant will be added or placed at 6th , 7th , 8th bit of image. In this we made changes up to 3 bits, i.e. changes of seven in binary term, but we have to add +6 or -6 not the seven to form the stego image.

Key-Words / Index Term

Steganography, Information hiding, LSB, Matrix multiplication, PSNR, MSE

References

[1] A. Cheddad and J. Condell, “Image Steganography survey and analysis”, Faculty of Computing and Engineering, Volume 90, Issue 12, pp. 727-752 , 2010
[2] T. Morkel and J.H.P. Eloff, “Exploring simple steganography”, Information and Computer Security Architecture Research Group, Department of Computer Science, University of Pretoria, Volume 87, Issue 2, pp. 26-34, 2005
[3] S. R. Yadav, A. Tiwari and N.K. Mittal, “Image Steganography technique”, International Journal of Engineering and Innovative Technology, Volume 3, Issue 7, pp. 19-23, 2014
[4] L. Zhi and S. A. Fen, “LSB Image Steganography”, Vehicular Technology Conference IEEE, Volume 3, Issue 5, pp. 2113-2117, 2004
[5] K. Muhammad and M. Sajjad, “Modification on LSB method”, Springer Science, Volume 22, Issue 1, pp. 647-654, 2015
[6] B. Siddiqui and S. Goswami, “A Survey on Image steganography using LSB substitution technique”, International Research Journal of Engineering and Technology, Volume 4, Issue 5, pp. 345-349, 2017
[7] K. Joshi, R. Yadav , “A new image steganography using three bit plane of gray level images”, International Research Journal of Engineering and Technology, Volume 10, Issue 38, pp. 1-8, 2017
[8] R. Tavoli and M. Bakhshi, “A new method for text hiding in the image using LSB”, International Journal of advanced computer science and applications, Volume 7, Issue 4, pp. 126-132, 2016
[9] S. Batra, R. Rishi and R. Yadav, “Insertion of message in 6th , 7th , 8th bit of pixel and its retrieval in cases changes the LSB of image pixels”, International Journal of security and its applications, Volume 4, Issue 3, pp. 1-10, 2010
[10] S. Arjun, A. Negi and C. Kranthi, "An approach to adaptive steganography based on matrix embedding”, Proceedings of the IEEE Conference, 2014
[11] S. K. Azad and S. K. Muttoo, “A Survey on Image steganography using LSB substitution technique”, International Journal of Electronic security and Digital Forensics, Volume X, Issue Y, pp. 1-21, 2014
[12] C. Zou, W.Mazurczyk and G.T. Leavens, “Image Steganography technique”, Computer Vision and Pattern Recognition Workshop and IEEE Conference, 2017
[13] A.F. Nilizadeh and A. R. Naghsh Nilchi, “Steganography on RGB Images based on matrix pattern using random blocks ”, International Journal of Modern Education and Computer Science, Volume 5, Issue 4, pp. 8-18, 2013
[14] A.F. Nilizadeh and A. R. Naghsh Nilchi, “A Novel Steganography method based on matrix pattern and LSB algorithms in RGB images”, Swarm Intelligence and Evolutionary Computation and IEEE Conference, 2016
[15] T. Yang and H. Chen, “Matrix embedding insteganography with binary Reed-Muller codes”, Institution of Engineering and Technology, Volume 11, Issue 7, pp. 522-529, 2017
[16] V. M. Potdar and E. Chang, “Gray level modification steganography for secret communication”, Proceedings of the International Conference on Industrial Informatics, pp. 223-8, 2004
[17] H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods”, IEEE Proceedings of Vision, Image and Signal Processing, Volume 152, Issue 5, pp. 611-15, 2005
[18] D.C. Wu and W.H. Tsai, “A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, Volume 24, Issue 9/10, pp. 1613-1626, 2003
[19] C. C Chang and H.W. Tseng, “A steganographic method for digital images using side match”, Pattern Recognition Letters, Volume 25, Issue 12, pp. 1431-1437, 2004
[20] C. C. Chang, T. D. Kieu and Y. C. Chou, “Using nearest covering codes to embed secret information in grayscale images”, Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 315-20, 2008
[21] A. Faruq and H.S. Ghwanmeh, “An innovative information hiding technique utilizing cumulative peak histogram regions”, Journal of Systems and Information Technology, Volume 14, Issue 4, pp. 336-352, 2012
[22] K. Joshi, R. Yadav and R. Saini, “A new image steganography approach for information security using gray level images in spatial domain”, International Journal on Computer Science and Engineering, Volume 3, Issue 7, pp. 2679-2690, 2011
[23] K. Joshi, R. Yadav and S. Allwadhi, "PSNR and MSE based investigation of LSB”, Proceedings of the International Conference on Computational Techniques in Information and Communication Technologies, pp. 280-285, 2016
[24] K. Joshi, R. Yadav and G. Chawla, “An Enhanced method for data hiding using 2 bit XOR in image steganography”, International Journal of engineering and technology, Volume 8, Issue 6, pp. 3043-3055, 2017