{"title":"Secured steganography algorithm based random function","authors":"Hamdy M. Mousa","doi":"10.1109/ICCES.2013.6707209","DOIUrl":null,"url":null,"abstract":"In this paper, we propose modified least significant bit steganography technique in order to make the technique more secure and hence less predictable. In this technique, the function and threshold value are randomly generated that used to encrypt the secret message using bit exchange method. The encrypted message is embedded into host image. Experimental results demonstrate that proposed technique has multilayer protection stages against different attacks and it can defeat many existing steganalytic attacks and higher level of security based on the function parameters and threshold values. Stego images quality is acceptable because of the difference between histograms of the host image and its stego-image is negligible and all obtained PSNR values exceed 50 dB.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2013.6707209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, we propose modified least significant bit steganography technique in order to make the technique more secure and hence less predictable. In this technique, the function and threshold value are randomly generated that used to encrypt the secret message using bit exchange method. The encrypted message is embedded into host image. Experimental results demonstrate that proposed technique has multilayer protection stages against different attacks and it can defeat many existing steganalytic attacks and higher level of security based on the function parameters and threshold values. Stego images quality is acceptable because of the difference between histograms of the host image and its stego-image is negligible and all obtained PSNR values exceed 50 dB.