DOI QR코드

DOI QR Code

A Techniques for Information Hiding in the Steganography using LSB and Genetic Algorithm

유전적 알고리즘과 LSB를 이용한 스테가노그래피의 정보은닉 기법

  • Ji, Seon-Su (Department of software, Gangneung Wonju National University)
  • Received : 2018.04.25
  • Accepted : 2018.05.29
  • Published : 2018.06.30

Abstract

The goal of the secret message communication on the internet is to maintain invisibility and confidentiality. Digital steganography is a technique in which a secret message is inserted in a cover medium and transmitted to a destination so that a third party can not perceive the existence of the message itself. Steganography is an efficient method for ensuring confidentiality and integrity together with encryption techniques. In order to insert a secret (Hangul) message, I propose a image steganography method that the secret character is separated and converted into binary code with reference to the encryption table, the cover image is divided into two areas, and the secret message and the right l-LSB information of the second area are encrypted and crossed, concealing the k-LSB of the first region. The experimental results of the proposed method show that the PSNR value is 52.62 and the acceptable image quality level.

인터넷 상에서 비밀 메시지의 통신 목표는 비인지성과 기밀성을 유지하는 것이다. 디지털 스테가노그래피는 메시지 존재 자체를 제3자가 감지하지 못하게 커버 매체에 비밀 메시지를 삽입하여 목적지에 전송하는 기법이다. 스테가노그래피는 암호화 기법과 혼합되어 기밀성과 무결성을 함께 보장하기 위한 효율적인 방법이다. 비밀(한글) 메시지를 삽입하기 위해 비밀 문자를 분리하고 암호표를 참고로 하여 이진화 코드로 변환하며, 커버 이미지를 두 영역으로 분할하며, 비밀 메시지와 두 번째 영역의 오른쪽 l-LSB 정보를 암호화와 교차 과정을 진행한 후 첫 번째 영역의 k-LSB에 은닉하여 스테고 이미지를 구성하는 방법을 제안한다. 제안된 방법의 실험결과는 PSNR 값이 52.62로 허용 이미지 품질 수준임을 보여준다.

Keywords

References

  1. S. S. Ji, "A Study of Hangul Text Steganography based on Genetic Algorithm", KIISC, Vol. 21, No. 3, pp. 7-12, 2016.
  2. Orooba Ismaeel Ibraheem Al-Farraji, "New Technique of Steganography based on Locations of LSB", International Journal of Information Research and Review, Vol. 4, Issue 1, pp. 3549-3553, 2017.
  3. R. Z. Wang, C. F. Lin and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm", Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  4. A. Nag, J. P. Singh, S. Khan, Ghosh S., Biswas S., Sarkar D., and Sarkar P. P., "A Weighted Location Based LSB Image Steganography Technique", ACC 2011, Part II, CCIS 191, pp. 620-627, 2011.
  5. Reza tavoli, Maryam bakhshi and Fatemeh salehian, "A New Method for Text Hiding in the Image by Using LSB", International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, pp. 126-132, 2016.
  6. C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution", Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
  7. Marghny Mohamed, Fadwa Al-Afari and Mohamed Bamatraf, "Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation", International Arab Journal of e-Technology, Vol. 2, No. 1, pp. 11-17, 2011.
  8. R. Z. Wang, C. F. Lin and J. C. Lin, "Hiding Data in Images by Optimal Moderately Significant-bit Replacement", IEE Electron. Lett. Vol. 36, No. 25, pp. 2069-2070, 2000. https://doi.org/10.1049/el:20001429
  9. Da Chun Wu and Wen Hsiang Tsai, "A Steganographic Method for Images by Pixel Value Differencing", Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  10. Xin Liao, Qiao-yan Wen, and Jie Zhang, "A Steganographic Method for Digital Images with Four-pixel Differencing and Modified LSB Substitution", Journal Visual Communication and Image Representation, Vol.22, pp. 1-8, 2011. https://doi.org/10.1016/j.jvcir.2010.08.007
  11. C. H. Yang, C. Y. Weng, S. J. Wang and H. M. Sun, "Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems", IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497, 2008. https://doi.org/10.1109/TIFS.2008.926097
  12. G. Swain and S. K. Lenka, "Classification of Image Steganography Techniques in Spatial Domain: A Study", International Journal of Computer Science& Engineering Technology, Vol. 5, No. 3, pp. 219-232, 2014.