CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding

by M. Naseem, Ibrahim M. Hussain, M. Kamran Khan, Aisha Ajmal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 12
Year of Publication: 2011
Authors: M. Naseem, Ibrahim M. Hussain, M. Kamran Khan, Aisha Ajmal
10.5120/3706-4947

M. Naseem, Ibrahim M. Hussain, M. Kamran Khan, Aisha Ajmal . An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding. International Journal of Computer Applications. 29, 12 ( September 2011), 28-35. DOI=10.5120/3706-4947

@article{ 10.5120/3706-4947,
author = { M. Naseem, Ibrahim M. Hussain, M. Kamran Khan, Aisha Ajmal },
title = { An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 12 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number12/3706-4947/ },
doi = { 10.5120/3706-4947 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:40.126728+05:30
%A M. Naseem
%A Ibrahim M. Hussain
%A M. Kamran Khan
%A Aisha Ajmal
%T An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 12
%P 28-35
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we propose an algorithm called Optimum Intensity Based Distributed Hiding (OIBDH) for secret data hiding inside cover images. The algorithm is a modified version of Bit Plane Splicing LSB technique with better hidden capacity and improved embedding process. The proposed algorithm outperforms Bit Plane Splicing LSB technique as more data can be hidden without degrading the quality of the cover image. Furthermore, both algorithms are tested using entropy curves and results show that OIBDH has lower absolute entropy difference compared to Bit Plane Splicing LSB technique in all the tested images.

References
  1. Dapeng Wu, Yiwei Thomas Hou, Wenwu Zhu, Ya-Qin Zhang and Jon M. Peha, "Streaming Video over the Internet: Approaches and Directions", IEEE Transactions on circuits and systems for video technology, vol. 11, no. 3, pp. 282 – 300, March 2001.
  2. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, “Digital Watermarking and Steganography”, 2nd Edition, Morgan Kaufmann Publishers, 2008 (ISBN 978-0-12-372585-1).
  3. R.J. Anderson and F.A.P. Petitcolas, “On the Limits of Steganography”, J. Selected Areas in Comm., vol. 16, no. 4, pp. 474 – 481, May 1998.
  4. Sung, A.H., Tadiparthi G.R. and Mukkamala S., "Defeating the current steganalysis techniques (robust steganography)", in proc. of The International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas, Nevada, USA, vol. 1, pp. 440 – 444, April 2004.
  5. Chiou-Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in Images", IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58 – 68, January 1999.
  6. Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Atal Chaudhuri and Monalisa Banerjee, "An Invisible Color Watermarking Framework for Uncompressed Video Authentication", International Journal of Computer Applications, vol. 1, no. 11, pp. 22 – 28, February 2010.
  7. Chun-Hsiang Huang and Ja-Ling Wu, "Attacking visible watermarking schemes", IEEE Transactions on Multimedia, vol. 6, no. 1, pp. 16 – 30, Feb. 2004.
  8. Guorong Xuan, Jiang Zhu, Jidong Chen, Shi, Y.Q., Zhicheng Ni and Wei Su, "Distortionless data hiding based on integer wavelet transform", Electronic letters, vol. 38, no. 25, pp. 1646 – 1648, Dec. 2002.
  9. Faisal T. Alturkia, Ali F. Almutairib, and Russell M. Mersereauuc, "Analysis of blind data hiding using discrete cosine transform phase modulation", Signal Processing: Image Communication, Vol. 22 no. 4, pp. 347 – 362, April 2007.
  10. Chou, J. and Ramchandran K., "Robust turbo-based data hiding for image and video sources", in proc. of IEEE International Conference on Multimedia and Expo 2002 (ICME '02), Lausanne, Switzerland, August 2002, vol. 2, pp. 565 – 568.
  11. Sandipan Dey, Ajith Abraham and Sugata Sanyal, "An LSB Data Hiding Technique Using Prime Numbers", in proc. of the Third International Symposium on Information Assurance and Security (IAS '07), Manchester, United Kingdom, August 2007, pp. 101 – 106.
  12. Chi-Kwong Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution", Pattern Recognition, vol. 37, no. 3, pp. 469 – 474, March 2004.
  13. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang and Hung-Min Sun, "Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems", IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488 – 497, Sep. 2008.
  14. Cheng-Hsing Yang,"Inverted pattern approach to improve image quality of information hiding by LSB substitution", Pattern Recognition, vol. 41, no. 8, pp. 2674 – 2683, Feb. 2008.
  15. Keiji Yanai and Kobus Barnard, "Image region entropy: a measure of "visualness" of web images associated with one concept", in proc. of the 13th annual ACM international conference on Multimedia, Singapore, November 2005, pp. 419 – 422.
  16. Norman Abramson, "Information Theory and Coding", 1st edition, McGraw-Hill Education, 1963.
Index Terms

Computer Science
Information Sciences

Keywords

Cover image Entropy Hiding capacity LSB Steganography