Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing d...

Full description

Bibliographic Details
Main Authors: W. Saqer, T. Barhoom
Format: Article
Language:English
Published: D. G. Pylarinos 2016-06-01
Series:Engineering, Technology & Applied Science Research
Subjects:
LSB
Online Access:https://etasr.com/index.php/ETASR/article/view/649
id doaj-88430194ab5d4c0684fe895ce762523f
record_format Article
spelling doaj-88430194ab5d4c0684fe895ce762523f2020-12-02T16:33:30ZengD. G. PylarinosEngineering, Technology & Applied Science Research2241-44871792-80362016-06-0163Steganography and Hiding Data with Indicators-based LSB Using a Secret KeyW. Saqer0T. Barhoom1Faculty of Information Technology, Islamic University of Gaza, PalestineFaculty of Information Technology, Islamic University of Gaza, PalestineSteganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB) algorithm which is embedding secret data in the least significant bit(s) of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once. https://etasr.com/index.php/ETASR/article/view/649SteganographySteganographicLeast Significant BitLSBData HidingData Concealing
collection DOAJ
language English
format Article
sources DOAJ
author W. Saqer
T. Barhoom
spellingShingle W. Saqer
T. Barhoom
Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
Engineering, Technology & Applied Science Research
Steganography
Steganographic
Least Significant Bit
LSB
Data Hiding
Data Concealing
author_facet W. Saqer
T. Barhoom
author_sort W. Saqer
title Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
title_short Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
title_full Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
title_fullStr Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
title_full_unstemmed Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
title_sort steganography and hiding data with indicators-based lsb using a secret key
publisher D. G. Pylarinos
series Engineering, Technology & Applied Science Research
issn 2241-4487
1792-8036
publishDate 2016-06-01
description Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB) algorithm which is embedding secret data in the least significant bit(s) of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.
topic Steganography
Steganographic
Least Significant Bit
LSB
Data Hiding
Data Concealing
url https://etasr.com/index.php/ETASR/article/view/649
work_keys_str_mv AT wsaqer steganographyandhidingdatawithindicatorsbasedlsbusingasecretkey
AT tbarhoom steganographyandhidingdatawithindicatorsbasedlsbusingasecretkey
_version_ 1724405129717743616