A Robust Data Hiding Technique based on LSB Matching

Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into number of segments. However, the cover image will also be divided into the same number of segments. Each segment of data will be compared with each segment of image to find the best match segment, in order to create a new random sequence of segments to be inserted then in a cover image. Experimental results show that the proposed technique has a high security level and produced better stego-image quality.




References:
[1] Zahra Toony and Mansour Jamzad "A Novel Image Hiding Scheme
Using Content Aware Seam Carving Method" International Conference
on Availability, Reliability and Security , 2010
[2] Peticolas FAP, Anderson RJ, and Kuhn MG, "Information hiding-A
survey," Proc. of the IEEE, Vol. 87, No. 7, pp.1062-1078,1999.
[3] Niels Provos and Peter Honeyman, "Hide and Seek: An Introduction to
Steganography", IEEE 1540-7993, June 2003
[4] M.M Amin, M. Salleh, S. Ibrahim, M.R. Katmin, and M.Z. I.
Shamsuddin " Information hiding using Steganography" IEEE 0-7803-
7773-March 7, 2003.
[5] P. Tsai, etal. "Reversible image hiding scheme using predictive coding
and histogram shifting", Signal Processing, vol. 89. pp. 1129-1143,
2009.
[6] Emad T. Khalaf, Norrozila Sulaiman "Segmenting and Hiding Data
Randomly Based on Index Channel" IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN
(Online): 1694-0814
[7] Neil F. Johnson. Steganography tools. Available from:
http://www.jjtc.com /Security /stegtools.htm 2005.
[8] J. Daemen and V. Rijmen, AES Proposal: Rijndael,version 2, 1999.
Available from URL: http://www.esat. kuleuven.ac. be/vijmen/rijndael.
[9] Daemen J. and Rijmen V. Aes proposal: Rijndael,aes algorithm
submission. Technical report, http://www.nist.gov/ CryptoToolkit,
September 1999.
[10] M. M Amin, M. Salleh, S. Ibrahim, M.R.K atmin, and M.Z.I.
Shamsuddin "Information Hiding using Steganography" 4* National
Conference on Telecommunication Technology Proceedings, Shah
Alam, Malaysia, 2003.
[11] Peter Wayner,Disappearing Cryptography -Information Hiding:
Steganography & Watermarking-Second Edition. San Fransisco,
California, U.S.A.: Elsevier Science, 2002, ISBN 1558607692.
[12] Neil F. Johnson and Sushil Jajodia, Exploring Steganography: Seeing
the unseen IEEE transaction on Computer Practices. 1998.
[13] Ross Anderson, Roger Needham, Adi Shamir, The Steganographic File
System, 2nd Information Hiding Workshop, 1998.
[14] Emad T. Khalaf and Norrozila Sulaiman " A New Method of Image
Watermarking Based on Lowest Effective Bits" 2011 3rd International
Conference on Machine Learning and Computing (ICMLC 2011)
February 26-28, 2011, Singapore ,V5-504
[15] A. Sverdlov, S. Dexter, and A. M. Eskicioglu, "RobustDCT-SVD
domain image watermarking for copyright protection: Embedding data
in all frequencies," Proc.European Signal Processing Conference,
Turkey, 2005.