Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood
Downloads
Background: The confidentiality of a message may at times be compromised. Steganography can hide such a message in certain media. Steganographic media such as digital images have many pixels that can accommodate secret messages. However, the length of secret messages may not match with the number of image pixels so the messages cannot be inserted into the digital images.
Objective: This research aims to see the dynamics between an image size and a secret message's length in order to prevent out of range messages entered in an image.
Methods: This research will combine the Least Significant Bit (LSB) method and the Stretch technique in hiding secret messages. The LSB method uses the 8th bit to hide secret messages. The Stretch technique dynamically enlarges the image size according to the length of the secret messages. Images will be enlarged horizontally on the rightmost image pixel block until n blocks of image pixels.
Results: This study compares an original image size and a stego image size and examines a secret message's length that can be accommodated by the stego image, as well as the Mean Square Error and Structure Similarity Index. The test is done by comparing the size change of the original image with the stego image from the Stretch results, where each original image tested always changes dynamically according to the increasing number of secret message characters. From the MSE and SSIM test results, the success was only with the first image, while the second image to the fourth image remained erroneous because they also did not have the same resolution.
Conclusion:The combination of LSB steganography and the Stretch technique can enlarge an image automatically according to the number of secret messages to be inserted. For further research development, image stretch must not only be done horizontally but also vertically.
N. Khairina, "Analisis Steganografi Metode Two-Sided Side Match," Journal of Computer Engineering, System and Science (CESS), vol. 1, no. 2, pp. 7-11, 2016.
A. Tasheva, Z. Tasheva and P. Nakov, "Image-Based Steganography Using Modified LSB Insertion Method with Contrast Stretching," in International Conference on Computer Systems and Technologies, Ruse, Bulgaria, 2017.
A. Asokan, D. E. Popescu, J. Anitha, and D. J. Hemanth, "Bat Algorithm Based Non-linear Contrast Stretching for Satellite Image Enhancement," geosciences, vol. 10, no. 78, pp. 1-12, 2020.
W. Dong and S. S.-T. Yau, "A Novel Image Description With the Stretched Natural Vector Method: Application to Face Recognition," IEEE, vol. 8, pp. 100084-100094, 2020.
Daryanto, "Aplikasi Pembesaran Citra Menggunakan Metode Nearest Neighbour Interpolation," Jurnal Sistem dan Teknologi Informasi Indonesia (JUSTINDO) , vol. 1, no. 1, pp. 31-35, 2016.
D. Zhang, S. Wang, J. Wang, A. K. Sangaiah, F. Li and V. S. Sheng, "Detection of Tampering by Image Resizing Using Local Tchebichef Moments," Applied Science, vol. 9, no. 3007, pp. 1-10, 2019.
W. Saqer and T. Barhoom, "Steganography and Hiding Data with Indicators-based LSB Using a Secret Key," Engineering, Technology & Applied Science Research, vol. 6, no. 3, pp. 1013-1017, 2016.
E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed, and E. Mohamed, "A Secure Image Steganography Algorithm Based on Least Signiï¬cant Bit and Integer Wavelet Transform," Journal of Systems Engineering and Electronics, vol. 29, no. 3, pp. 639-649, 2018.
K. Tutuncu and B. Demirci, "Adaptive LSB Steganography Based on Chaos Theory and Random Distortion," Advances in Electrical and Computer Engineering , vol. 18, no. 3, pp. 15-22, 2018.
G. Swain, "High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis," Security and Communication Networks, pp. 1-14, 2018.
Y. Inan, "Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB," in ITM Web of Conferences , Polandia, 2018.
M. Hussain, A. W. A. Wahab, N. Javed and K.-H. Jung, "Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Signiï¬cant Bit for Digital Images," Symmetry , vol. 8, no. 41, pp. 1-21, 2016.
M. Li´skiewicz, R. Reischuk and U. Wölfel, "Security Levels in Steganography Insecurity does not Imply Detectability," Theoretical Computer Science, pp. 1-15, 2017.
A. Pradhan, K. R. Sekhar and G. Swain, "Digital Image Steganography Using LSB Substitution, PVD, and EMD," Mathematical Problems in Engineering, pp. 1-12, 2018.
N. Khairina, M. K. Harahap and J. H. Lubis, "The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit," International Journal Of Information System & Technology, vol. 2, no. 1, pp. 1-6, 2018.
K. Joshi, S. Gill and R. Yadav, "A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image," Journal of Computer Networks and Communications, pp. 1-11, 2018.
J. K. Mandal, Reversible Steganography and Authentication via Transform Encoding, Springer, 2020.
N. Khairina and M. K. Harahap, "Menjaga Kerahasiaan Data dengan Steganografi Kombinasi LSB-2 dengan LSB-3," SinkrOn - Jurnal & Penelitian Teknik Informatika , vol. 3, no. 1, pp. 286-288, 2018.
G. Chen, H. Zhao, C. K. Pang, T. Li and C. Pang, "Image Scaling: How Hard Can It Be?," IEEE Access, vol. 7, pp. 129452-129465, 2019.
A. Y. Hindi, M. O. Dwairi and Z. A. AlQadi, "A Novel Technique for Data Steganography," Engineering, Technology & Applied Science Research , vol. 9, no. 6, pp. 4942-4945, 2019.
Authors who publish with this journal agree to the following terms:
All accepted papers will be published under a Creative Commons Attribution 4.0 International (CC BY 4.0) License. Authors retain copyright and grant the journal right of first publication. CC-BY Licenced means lets others to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material for any purpose, even commercially).