Cover
Vol. 10 No. 1 (2010)

Published: June 30, 2010

Pages: 66-75

Original Article

Variable Length Least Significant Bits Embedding

Abstract

A novel hiding system is proposed in this work which is based on Least Significant Bits (LSB) embedding of information such as speech in gray scale images. The proposed hiding algorithm embeds the secrete infonnation message bits in the least significant bits of the cover image pixels such that the number of secrete infurmation bits to he embedded in least significant bits of cover image pixel is variable and detennined randomly. So that cover image pixel may contain no secrete information bit, one bit, two bits , or three bits according to the pseudo random nwnber generator that generates integer numbers randomly between O and 3. The resulting image (the cover image within which the secret information is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret infonnation. It ensures that the eavedroppers will not have any suspicion that message bits are hidden in the illll!ge and standard steganography detection methods can not estimate the locations in which the secret message bits are embedded and can not estimate the locations in which the secrete information bits are hidden nor the number of bits embedded in oover image . The proposed system achieves perfect reconstruction of the secret message.

References

  1. W. Bender, W. Butera, et al., "Applications for data hiding", IBM Systems Journal, Vol. 39, pp. 547-568, 2000.
  2. W. Niblack, et al., "The QBIC project: querying images by content using color, texture, and shape", Proc. SPIE, Storage and Retrieval for Image and Video Databases, vol. 1908, pp. 173-187, Feb. 1993.
  3. R. Chandramouli and N. Memon, "Analysis of LSB based Image Steganography", IEEE ICIP, pp. 1022-1025, Oct. 2001.
  4. D. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing, pp. 75-80, May-June 2001.
  5. F. N. Johnson, Z. Duric, and S. Jajodia, "Information Hiding: Steganography and Watermarking - Attacks and Countermeasures", Kluwer Academic Publishers, 2001.
  6. N. Provos, "Defending against statistical steganalysis", In 10th USENIX Security Symposium, Washington, DC, 2001.
  7. A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems", In Proceedings of Information Hiding: Third International Workshop, Dresden, Germany, 1999.
  8. Min Wu and Bede Liu, "Data Hiding in Binary Image for Authentication and Annotation", IEEE Transactions on Multimedia, pp. 528-538, August 2004.
  9. W. Bender, et al., "Techniques for Data Hiding", Proc. of SPIE Conf. on Storage and Retrieval for Image and Video, Vol. 2420, pp. 40, Feb. 1995.
  10. K. Nikolaidis and I. Pitas, "Copyright Protection of Images using Robust Digital Signatures", Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Vol. 4, pp. 2168-2171, May 1996.
  11. P.H.W. Wong, O.C. Au, et al., "Image Watermarking Using Spread Spectrum Technique in Log-2-Spatio Domain", Proc. of IEEE Int. Sym. on Circuits & Systems, June 2000.
  12. A. Menezes, P. Van Oorschot, and S. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1996.
  13. H. H. Al-Obaidy, "Encryption Using Wavelet Coded Image Data", MSc Thesis, Computer Engineering Department, College of Engineering, University of Basrah, 2004.
  14. R. E. Ziemer, "Signals and Systems: Continuous and Discrete", Fourth Edition, Prentice Hall, 1998.
  15. L. Rabiner and R. W. Schafer, "Fundamentals of Speech Recognition", Prentice Hall, 1993.