A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images

by   Ankit Chaudhary, et al.

This paper proposes an improved steganography approach for hiding text messages in lossless RGB images. The objective of this work is to increase the security level and to improve the storage capacity with compression techniques. The security level is increased by randomly distributing the text message over the entire image instead of clustering within specific image portions. Storage capacity is increased by utilizing all the color channels for storing information and providing the source text message compression. The degradation of the images can be minimized by changing only one least significant bit per color channel for hiding the message, incurring a very little change in the original image. Using steganography alone with simple LSB has a potential problem that the secret message is easily detectable from the histogram analysis method. To improve the security as well as the image embedding capacity indirectly, a compression based scheme is introduced. Various tests have been done to check the storage capacity and message distribution. These testes show the superiority of the proposed approach with respect to other existing approaches.


A new adaptive method for hiding data in images

LSB method is one of the well-known steganography methods which hides th...

Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution

In this paper a novel spatial domain LSB based watermarking scheme for c...

A high capacity text steganography scheme based on permutation and color coding

In this paper, we propose a text steganographic scheme based on color co...

Review and Test of Steganography Techniques

Steganography is the art of concealing a secret message within an approp...

A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Typically, metadata of images are stored in a specific data segment of t...

A New Parallel Message-distribution Technique for Cost-based Steganography

This paper presents two novel approaches to increase performance bounds ...

An adaptive algorithm for embedding information into compressed JPEG images using the QIM method

The widespread use of JPEG images makes them good covers for secret mess...

Please sign up or login with your details

Forgot password? Click here to reset