Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.4.11

Image Steganography to Hide Unlimited Secret Text Size  

Almazaydeh, Wa'el Ibrahim A. (Aqaba College University, Al-Balqa Applied Science)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.4, 2022 , pp. 73-82 More about this Journal
Abstract
This paper shows the hiding process of unlimited secret text size in an image using three methods: the first method is the traditional method in steganography that based on the concealing the binary value of the text using the least significant bits method, the second method is a new method to hide the data in an image based on Exclusive OR process and the third one is a new method for hiding the binary data of the text into an image (that may be grayscale or RGB images) using Exclusive and Huffman Coding. The new methods shows the hiding process of unlimited text size (data) in an image. Peak Signal to Noise Ratio (PSNR) is applied in the research to simulate the results.
Keywords
Steganography; Huffman Code; Zigzag Scanning; Symmetric key;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Wa'el Ibrahim A. Al-Mazaydeh. "Image Steganography using LSB and LSB+Huffman Code". International Journal of Computer Applications. ISSN: (0975 - 8887), Volume 99-No.5, August 2014.
2 Wa'el Ibrahim A. Almazaydeh, H. S. Sheshadri. "Image Steganography using LSB, LSB+Huffman Code, and LSB+Arithmetic Code". International Journal of Computer Applications. ISSN: (0975 - 8887), Volume 155 - No 11, December 2016.
3 Sandeep Panghal, Sachin Kumar, Naveen Kumar. "Enhanced Security of Data using Image Steganography and AES Encryption Technique". International Journal of Computer Applications. (0975 - 8887) Recent Trends in Future Prospective in Engineering & Management Technology 2016.
4 Kiswara Agung Santoso, Ahmad Kamsyakawuni and Abduh Riski. "Hiding The Text Into An Image By Max-Plus Algebra". Proc. ICOMITEE 2019, October 16th-17th 2019, Jember, Indonesia.
5 Ghazanfar Farooq Siddiqui, Muhammad Zafar Iqbal, Khalid Saleem, Zafar Saeed, Adeel Ahmed, Ibrahim A. Hameed, and Muhammad Fahad Khan. "A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems". IEEE Access. DOI: 10.1109/ACCESS.2020.3028315.   DOI
6 Abhishek Koluguri, Sheikh Gouse, Dr. P. Bhaskara Reddy. "Text Steganography Methods and its Tools". International Journal of Advanced Scientific and Technical Research. Issue 4 volume 2, March-April 2014.
7 Yun-Te Lin, Chung-Ming Wang, Wei-Sung Chen, Fang- Pang Lin, and Woei Lin. "A Novel Data Hiding Algorithm for High Dynamic Range Images". IEEE TRANSACTIONS ON MULTIMEDIA. VOL. 19, NO. 1, JANUARY 2017.
8 NELS PROVOS AND PETER HONEYMAN. "Hide and Seek: An Introduction to Steganography". IEEE Computer Society. Volume: 99, Issue: 3, May-June 2003.
9 Huaibo Sun , Hong Luo , and Yan Sun. "Data Hiding for Ensuring the Quality of the Host Image and the Security of the Message". IEEE Access, vol. 7, 2019, Digital Object Identifier 10.1109/ACCESS.2019.2907530.   DOI
10 Nandhini Subramanian, Omar Elharrouss, Somaya Al-Maadeed, and Ahmed Bouridane. "Image Steganography: A Review of the Recent Advances". IEEE Access, vol. 9, 2021, Digital Object Identifier 10.1109/ACCESS.2021.3053998.   DOI
11 Dr. Saad Abdual azize AL_ani, Bilal Sadeq Obaid Obaid. "A Steganography Method to Embed Text in Image without Change Structure of Image". INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER RESEARCH. Volume 3 issue 1 January 2015 Page No.824-828 ISSN: 2320-7167.
12 Wa'el Ibrahim A. Almazaydeh and Prof. H. S. Sheshadri. "Image Steganography using a Dynamic Symmetric Key". In 2nd International Conference on Trend in Electronics and Informatics (ICOEI 2018). IEEE Conference Record: #42666, IEEE DVD ISBN: 978-1-5386-3569-8.
13 Dharmesh Mistry, Richa Desai, and Megh Jagad. "Hidden Data Transmission using Image Steganography". International Journal of Computer Applications (0975 -8887). Volume 130 - No.14, November 2015.
14 Amanjot Kaur, Dr. Bikrampal Kaur. "Secure The Secret Information In An Image Using K-MM In Steganography". Journal of Multidisciplinary Engineering Science and Technology (JMEST). ISSN: 3159-0040, Vol. 2 Issue 8, August - 2015.
15 Iain E. G. Richardson. H.264 and MPEG-4 Video Compression. The Robert Gordon University, Aberdeen, UK 2003.
16 JAGAN RAJ JAYAPANDIYAN, C. KAVITHA, AND K. SAKTHIVEL. "Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization". IEEE Access, Digital Object Identifier 10.1109/ACCESS.2020.3009234   DOI