z-logo
open-access-imgOpen Access
Image steganography using least significant bit and secret map techniques
Author(s) -
Ashwaq Alabaichi,
Maisa'a Abid Ali K. Al-Dabbas,
Adnan Ibrahem Salih
Publication year - 2020
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v10i1.pp935-946
Subject(s) - steganography , information hiding , computer science , peak signal to noise ratio , histogram , arithmetic underflow , steganalysis , least significant bit , artificial intelligence , image quality , entropy (arrow of time) , pixel , key (lock) , computer vision , pattern recognition (psychology) , algorithm , image (mathematics) , physics , computer security , quantum mechanics , programming language , operating system
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here