• Title/Summary/Keyword: LSB(least significant bit)

Search Result 64, Processing Time 0.026 seconds

The properties Analysis of IDEA algorithm (IDEA 알고리즘의 특성 분석)

  • 김지홍;장영달;윤석창
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.399-405
    • /
    • 2000
  • In this paper, we deal with block cipher algorithm IDEA(international data encryption algorithm), previously known as typical block cipher system. first of all, analysing key scheduler we classify the key sequences with the used key bit and the unused key bits in each round. with this properties we propose the two method, which are differential analysis using differences of plaintext pairs and linear analysis using LSB bit of plaintexts and key sequences.

  • PDF

A 2-GHz 8-bit Successive Approximation Digital-to-Phase Converter (2 GHz 8 비트 축차 비교 디지털-위상 변환기)

  • Shim, Jae Hoon
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.4
    • /
    • pp.240-245
    • /
    • 2019
  • Phase interpolation is widely adopted in frequency synthesizers and clock-and-data recovery systems to produce an intermediate phase from two existing phases. The intermediate phase is typically generated by combining two input phases with different weights. Unfortunately, this results in non-uniform phase steps. Alternatively, the intermediate phase can be generated by successive approximation, where the interpolated phase at each approximation stage is obtained using the same weight for the two intermediate phases. As a proof of concept, this study presents a 2-GHz 8-bit successive approximation digital-to-phase converter that is designed using 65-nm CMOS technology. The converter receives an 8-phase clock signal as input, and the most significant bit (MSB) section selects four phases to create two sinusoidal waveforms using a harmonic rejection filter. The remaining least significant bit (LSB) section applies the successive approximation to generate the required intermediate phase. Monte-Carlo simulations show that the proposed converter exhibits 0.46-LSB integral nonlinearity and 0.31-LSB differential nonlinearity with a power consumption of 3.12 mW from a 1.2-V supply voltage.

Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification (DWT기반 이미지 인증 및 변형 검출을 위한 혼합 워터마킹)

  • Kim Dong-Seo;Joo Nak-Keun;Kang Tae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.170-178
    • /
    • 2006
  • In this paper, the hybrid-watermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

A New Approach for Information Security using an Improved Steganography Technique

  • Juneja, Mamta;Sandhu, Parvinder Singh
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.405-424
    • /
    • 2013
  • This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB's (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

A Study on the Image Steganographic method using Multi-pixel Differencing and LSB Substitution Methods (다중 픽셀 차이값과 LSB 교체 기법을 이용한 이미지 스테가노그래픽 기법 연구)

  • Ha, Kyeoung-Ju;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.23-30
    • /
    • 2008
  • A data hiding method based on least significant bit (LSB) substitution and multi-pixel differencing (MPD) is presented on the proposed method to improve the capacity of the hidden secret data and to provide an imperceptible visual quality. First, a sum of different values for four-pixel sub-block is calculated. The low value of the sum can be located on a smooth block and the high value is located on an edged block. The secret data are hidden into the cover image by LSB method in the smooth block, while MPD method in the edged block. The experimental results show that the proposed method has a higher capacity and maintains a good visual quality.

  • PDF

Enhancing LSB Method Performance Using Secret Message Segmentation

  • Khrisat, Mohammad S.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.383-388
    • /
    • 2022
  • Many methods used for secret data steganography are based on least significant bit method, which is suffering from security and the embedded message can be easily hacked. In this paper research a proposed method of adding security issues will be introduced, a complex private key will be constructed, the contents of this key will depend on the results of secrete message segmentation. The proposed method will be implemented and the obtained experimental results will be compared with least significant method results to prove that the proposed method raises the image quality parameters.

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.

An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis

  • Nag, Amitava;Choudhary, Soni;Basu, Suryadip;Dawn, Subham
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.250-255
    • /
    • 2016
  • Steganography is the art and science of secure communication. It focuses on both security and camouflage. Steganographic techniques must produce the resultant stego-image with less distortion and high resistance to steganalysis attack. This paper is mainly concerned with two steganographic techniques-least significant bit (LSB)++ and the reversible histogram transformation function (RHTF). LSB++ is likely to produce less distortion in the output image to avoid suspicion, but it is vulnerable to steganalysis attacks. RHTF using a mod function technique is capable of resisting the most popular and efficient steganalysis attacks, such as the regular-singular pair attack and chi-squared detection steganalysis, but it produces a lot of distortion in the output image. In this paper, we propose a new steganographic technique by combining both methods. The experimental results show that the proposed technique overcomes the respective drawbacks of each method.