Abstract

Steganography is one of the security measures employed at file level to cover information in a carrier. The goal of steganography is to send a confidential message over a network in a way that intruders will not notice it. In steganography, the message is wrapped in an innocent carrier such as image, audio or video file. There are always bits tempering in the process and this changes the looks and appearance of the carrier. The more secret message is embedded in any cover file, the more random noise occurs. Secret message bits when embedded drastically modify the Red Green and Blue (RGB) components’ bits of the carrier, hence, the statistical properties and physical appearance of the carrier change and this draws the attention of intruders to suspect that confidential data is hidden there. This research introduced an improved method of least significant bit replacement to cover secret data using 24 bits bitmap image to handle random noise efficiently so that the Human Visual System (HVS) of intruders will not notice the secret communication. The research reviewed some previous related researches that aimed to reduce the effect of random noise and research gap is identified. The research implemented the new Modified Least Significant Bit Replacement (M-LSBR) method to fill the identified research gap. Five (5) experiments were conducted with 5 (five) varying dimension RGB images and the result gathered that the PSNR value, image quality and message capacity of the new method is better than those achieved by the previous methods, hence, the research gap is filled. Finally, conclusion was drawn and recommendation for future research was suggested.

Highlights

  • Unauthorized access to data is the common threats in a networked system that Salluri (2020) proposed a method that slightly modified the technique of data may cause loss of confidentiality, integrity, and availability of the information embedding into Image Encryption using the Symmetric Key for RDH in Cloud technology assets (Kaur, Inderjeet & Duhan, 2017)

  • Experimentations Experiments were carried out using Matlab software and observation of the image quality using Human Visual System (HVS) were the tools used in the experimentations

  • By Champakamala, Padmini and Radhika (2009) as seen in the literature review section is characterized with low Peak Signal to Noise Ratio (PSNR) value (9.9987 dB only)

Read more

Summary

Reviewed Literatures

Unauthorized access to data is the common threats in a networked system that Salluri (2020) proposed a method that slightly modified the technique of data may cause loss of confidentiality, integrity, and availability of the information embedding into Image Encryption using the Symmetric Key for RDH in Cloud technology assets (Kaur, Inderjeet & Duhan, 2017). Steganography is a step further to cryptography which only scrambles the across all image formats as shown in figure 2 This method can adaptively information into incomprehensible form to unauthorized person Ali and Omara (2016) proposed a random pixel replacement method to hide bits of the secret message. This method pays attention to hiding a message only in blue and green components of the cover image pixels, neglecting red colour component. This method achieved a high PSNR of 40.434 dB ; the appearance of the stego-image after embedding considerably changes. This research has come to fill these gaps found in these previous researches

Materials and Methods
Results and Discussion
Lighthouse 52
Desert
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call