DOI QR코드

DOI QR Code

Secure Steganography Based on Triple-A Algorithm and Hangul-jamo

Triple-A 알고리즘과 한글자모를 기반한 안전한 스테가노그래피

  • Ji, Seon-Su (Department of software, Gangneung Wonju National University)
  • Received : 2018.09.20
  • Accepted : 2018.10.18
  • Published : 2018.10.30

Abstract

Steganography is a technique that uses hidden messages to prevent anyone apart from knowing the existence of a secret message, except the sender and trusted recipients. This paper applies 24 bit color image as cover medium. And a 24-bit color image has three components corresponding to red, green and blue. This paper proposes an image steganography method that uses Triple-A algorithm to hide the secret (Hangul) message by arbitrarily selecting the number of LSB bits and the color channel to be used. This paper divides the secret character into the chosung, jungsung and jongsung, and applies crossover, encryption and arbitrary insertion positions to enhance robustness and confidentiality. Experimental results of the proposed method show that insertion capacity and correlation are excellent and acceptable image quality level. Also, considering the image quality, it was confirmed that the size of LSB should be less than 2.

스테가노그래피는 송신자와 신뢰하는 수신자를 제외하고, 어떤 사람도 비밀 메시지의 존재 자체를 알지 못하도록 숨겨진 메시지를 이용하는 기법이다. 이 논문에서는 24 비트 컬러 이미지를 커버 매체로 적용한다. 그리고 24 비트컬러 이미지에는 빨강, 녹색 및 파랑에 해당하는 세 가지 구성 요소가 있다. 이 논문에서는 Triple-A 알고리즘을 사용하여 LSB 비트의 수와 사용할 컬러 채널을 임의로 선택하여 비밀 (한글) 메시지를 숨기는 이미지 스테가노그래피 방법을 제안한다. 이 논문은 비밀 문자를 초성, 중성, 종성으로 나누고, 교차, 암호화 및 임의 삽입 위치를 적용하여 견고성과 기밀성을 강화한다. 제안된 방법의 실험결과는 삽입용량과 상관성이 우수하고, 허용 이미지 품질수준임을 보였다. 또한 이미지 품질을 고려할 때 LSB의 크기를 2이하로 하는 것이 효율적임을 확인하였다.

Keywords

References

  1. S. S. Ji, "A Study of Hangul Text Steganography based on Genetic Algorithm", KIISC, Vol. 21, No. 3, pp. 7-12, 2016.
  2. S. Alam1, S M Zakariya and N. Akhta, "Analysis of Modified Triple-A Steganography Technique using Fisher Yates Algorithm", International Conference on Hybrid Intelligent Systems, pp. 207-212, 2014.
  3. N. Tiwari1 and M. Shandilya, "Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth", International Journal of Security and Its Applications, Vol. 4, No. 4, pp. 53-62, 2010.
  4. Shahin Shabnam and K Hemachandran, "LSB based Steganography using Bit masking method on RGB planes", International Journal of Computer Science and Information Technologies, Vol. 7, No. 3, pp. 1169-1173, 2016.
  5. K. L. Prasad and T. Ch. Malleswara Rao, "A Novel Secured RGB LSB Steganography with Enhanced Stego-Image Quality", Int. Journal of Engineering Research and Applications, Vol. 3, Issue 6, pp. 1299-1303, 2013.
  6. Mamta Jain and Pallavi Kumari, "A Survey on Digital Image Steganography using RGB Color Channel", Suresh Gyan Vihar University International Journal of Environment, Science and Technology, Vol. 3, Issue 1, pp. 21-25, 2017.
  7. G. R. Manjula and Ajit Danti, "A Novel Hash based Least Significant Bit(2-3-3) Image Steganography in Spatial Domain", International Journal of Security, Privacy and Trust Management, Vol. 4, No. 1, pp. 11-20, 2015. https://doi.org/10.5121/ijsptm.2015.4102
  8. Md. M. Rahman, P. K. Mondal, I. Mandal and H Sultana, "Secure RGB Image Steganography Based on Triple-A Algorithm and Pixel Intensity", IJSER, Vol. 7, Issue 3, pp. 864-869, 2016.
  9. A. Gutub, A. Al-Qahtani and A. Tabakh, "Triple-A: Secure RGB Image Steganography Based on Randomization", ACS/IEEE International Conference on Computer Systems and Applications, pp. 400-403, 2009.
  10. Marwa M. Emamm, Abdelmgeid A. Aly and Fatma A. Omara, "A Modified Image Steganography Method based on LSB Technique", International Journal of Computer Applications, Vol. 125, No. 5, pp. 12-17, 2015. https://doi.org/10.5120/ijca2015905908
  11. C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution", Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
  12. G. Swain and S. K. Lenka, "Classification of Image Steganography Techniques in Spatial Domain: A Study", International Journal of Computer Science& Engineering Technology, Vol. 5, No. 3, pp. 219-232, 2014.