OPTIMIZATION OF AMELSBR STEGANOGRAPHY TECHNIQUES IN THE LAST FOUR BIT WITH COLOR IMAGE COVER
The dynamic growth of data transmission in the modern age needs a safe interchange of data. Usually, the answer is between steganography and cryptography. Steganography is a well-established technique for protecting hidden data from unauthorized access into a cover object in such a fashion that it is easily imperceptible to human eyes. Purpose: This work proposes an optimization towards Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) by modifying at least four bits to be replaced. Sadly, steganography is often detectable by human eyes, especially if underwent such bit replacement modification. To solve this problem, we have since optimized AMELSBR. Method: Specifically, we optimized AMELSBR so it can use the last 4 bit in cover image. We divided the experiment scheme based on per replaced bit, namely one bit, two bits, three bits, and four bits. The object covered in this work is colored images, divided into four classes: abstract images, landscape images, animal images, and fruit images.. Results: We were able to minimize Mean Squared Error into at least 1 and Peak-to-Signal Ratio into at least under 35 dB in this work. We also tested the stego images as the end result of the AMELSBR steganography process using brightness, contrast, resize, noise, and blur. Conclusion: Our experiment proves that the optimized AMELSBR as steganography technique can be reliable for text embedding in the cover image without using cryptography as intended in standard use.
K. Sharma, A. Aggarwal, T. Singhania, D. Gupta, and A. Khanna, “Hiding Data in Images Using Cryptography and Deep Neural Network,” arXiv Prepr. arXiv1912.10413, 2019.
X. Liang, Z. Yan, and P. Zhang, “Security, Privacy, and Anonymity in Computation, Communication, and Storage,” Int. Conf. Secur. Priv. Anonymity Comput. Commun. Storage (SpaCCS 2016), vol. 1, pp. 155–167, 2016, doi: 10.1007/978-3-319-72395-2.
M. Barbosa et al., “SoK: Computer-aided Cryptography,” 2021.
F. Sidik, F. E. Febriansyah, and others, “Perbandingan Metode Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) dan Discrete Cosine Transform untuk Steganografi Citra Digital,” J. Komputasi, vol. 6, no. 1, 2018.
M. Saravanan and A. Priya, “An Algorithm for Security Enhancement in Image Transmission Using Steganography,” J. Inst. Electron. Comput., vol. 1, no. 1, pp. 1–8, 2019.
O. Rachael, S. Misra, R. Ahuja, A. Adewumi, F. Ayeni, and R. Mmaskeliunas, “Image Steganography and Steganalysis based on Least Significant Bit (LSB),” in Proceedings of ICETIT 2019, Springer, 2020, pp. 1100–1111.
B. Hasan Saghir, E. A. Elmutalib Ahmed, G. Zen A. Salh, and A. H. Mansour, “A Spatial Domain Image Steganography Technique Based on Pseudorandom Permutation Substitution Method using Tree and Linked List,” Int. J. Eng. Trends Technol., vol. 23, no. 4, pp. 209–217, 2015, doi: 10.14445/22315381/ijett-v23p240.
M. Kalita, T. Tuithung, and S. Majumder, “A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution,” Comput. J., vol. 62, no. 11, pp. 1639–1655, Nov. 2019, doi: 10.1093/comjnl/bxz014.
J. Hashim, A. Hameed, M. J. Abbas, M. Awais, H. A. Qazi, and S. Abbas, “LSB Modification based audio steganography using advanced encryption standard (AES-256) technique,” in 2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2018, pp. 1–6.
D. Darwis, N. B. Pamungkas, and others, “Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness,” in Journal of Physics: Conference Series, 2021, vol. 1751, no. 1, p. 12039.
S. Manaseer, A. Aljawawdeh, and D. Alsoudi, “A New Image Steganography Depending On Reference and LSB,” Int. J. Appl. Eng. Res. ISSN 0973-4562 Vol., vol. 12, pp. 1950–1955, 2017.
A. Arya and S. Soni, “Performance Evaluation of Secrete Image Steganography Techniques Using Least Significant Bit (LSB) Method,” Int. J. Comput. Sci. Trends Technol., vol. 6, no. 2, pp. 160–165, 2018.
A. Alabaichi, M. A. A. K. Al-Dabbas, and A. Salih, “Image Steganography using Least Significant Bit and Secret Map Techniques,” Int. J. Electr. Comput. Eng., vol. 10, no. 1, 2020.
C. Arun and S. Murugan, “Design of Image Steganography using LSB XOR Substitution Method,” in 2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 674–677.
P. N. de Souza and P. Gladyshev, “Inference of Endianness and Wordsize From Memory Dumps,” in European Conference on Cyber Warfare and Security, 2017, pp. 619–627.
G. K. Soni, A. Rawat, S. Jain, and S. K. Sharma, “A Pixel-Based Digital Medical Images Protection Using Genetic Algorithm with LSB Watermark Technique,” in Smart Systems and IoT: Innovations in Computing, Springer, 2020, pp. 483–492.
A. Pradhan, K. R. Sekhar, and G. Swain, “Digital image steganography using LSB substitution, PVD, and EMD,” Math. Probl. Eng., vol. 2018, 2018.
L. Widyawati, I. Riadi, and Y. Prayudi, “Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., pp. 169–182, 2020.
Y.-K. Lee and L.-H. Chen, “An Adaptive Image Steganographic Model based on Minimum-Error LSB Replacement,” in Ninth National Conference on Information Security, 1999, pp. 8–15.
Q. M. Hussein, “New Metrics for Steganography Algorithm Quality,” Int. J. Adv. Sci. Technol., vol. 29, no. 02, 2020.
Copyright (c) 2022 Antivirus : Jurnal Ilmiah Teknik Informatika
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Copyright on any article is retained by the author(s).
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-ShareAlike 4.0 International License