Abstract
A digital color image usually has a high resolution, thus its size is good enough and the image can be used as a covering (holding) image to hide secrete messages (short and long). The methods commonly used for data steganography, e.g. LSB and LSB2 are not secure, so in this paper, a method of securing the LSB2 method is proposed. The proposed method is based on wavelet packet decomposition. The levels of decomposition will be kept in secret and one of the resulting segments will be used as a covering segment. MSE, PSNR, hiding time, and extraction time will be experimentally analyzed to prove that the proposed method is capable of handling the process of hiding secret messages, either sort or long.
Highlights
Data steganography [1,2,3] is the process of hiding secret data into covering data
The Peak Signal-to-Noise Ratio (PSNR) [10,11] between the original covering data and the holding data must very big in order to keep the quality of the holding data high
The LSB2 method adds minor changes to the covering image. These changes cannot be noticed by the human eyes, this method keeps the holding image very close to the covering one, and minimizes Mean Square Error (MSE) and maximizes PSNR
Summary
Data steganography [1,2,3] is the process of hiding secret data into covering data. The method must be capable of hiding secret data of various sizes (short and long messages). Significant Bit (LSB) method which requires 8 bytes from the holding image to hide one character from the secret message. The LSB2 adds minor changes to the covering image, ranging from +3 to -3 These changes in the pixel colors cannot be noticed by the human eye. The LSB2 method adds minor changes to the covering image These changes cannot be noticed by the human eyes, this method keeps the holding image very close to the covering one, and minimizes MSE and maximizes PSNR between the covering and the holding images.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Engineering, Technology & Applied Science Research
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.