Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach

Computer Science and Information Systems , 2021
This study proposes a new hybrid n-LSB (Least Significant Bit) substitution-based image steganography method in the spatial plane. The previously proposed n-LSB substitution method by authors of this paper is combined with the Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) encryption algorithms to improve the security of the steganography, which is one of the requirements of steganography, and the Lempel-Ziv-Welch (LZW), Arithmetic and Deflate lossless compression algorithms to increase the secret message capacity. Also, embedding was done randomly using a logistic map-based chaos generator to increase the security more. The classical n-LSB substitution method and the proposed hybrid approaches based on the previously proposed n-LSB were implemented using different secret messages and cover images. When the results were examined, it has been seen that the proposed hybrid n-LSB approach showed improvement in all three criteria of steganography. The proposed hybrid approach that consists of previously proposed n-LSB, RSA, Deflate, and the logistic map had the best results regarding capacity, security, and imperceptibility....Read more
Computer Science and Information Systems 00(0):00000000 https://doi.org/10.2298/CSIS123456789X Compensation of degradation, security, and capacity of 1 LSB substitution methods by a new proposed hybrid n- 2 LSB approach 3 Kemal Tütüncü, Özcan Çataltaş* 4 Faculty of Technology, Selcuk University, 5 42130 Konya, Turkey 6 {ktutuncu, ozcancataltas}@selcuk.edu.tr 7 Abstract. This study proposes a new hybrid n-LSB (Least Significant Bit) 8 substitution-based image steganography method in the spatial plane. The previously 9 proposed n-LSB substitution method by authors of this paper is combined with the 10 Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) 11 encryption algorithms to improve the security of the steganography, which is one 12 of the requirements of steganography, and the Lempel-Ziv-Welch (LZW), 13 Arithmetic and Deflate lossless compression algorithms to increase the secret 14 message capacity. Also, embedding was done randomly using a logistic map-based 15 chaos generator to increase the security more. The classical n-LSB substitution 16 method and the proposed hybrid approaches based on the previously proposed n- 17 LSB were implemented using different secret messages and cover images. When 18 the results were examined, it has been seen that the proposed hybrid n-LSB 19 approach showed improvement in all three criteria of steganography. The proposed 20 hybrid approach that consists of previously proposed n-LSB, RSA, Deflate, and the 21 logistic map had the best results regarding capacity, security, and imperceptibility. 22 Keywords: image steganography, lossless compression, logistic map, data 23 encryption. 24 1. Introduction 25 Today, the use of the internet and other technological tools in communication between 26 people is widespread. According to a survey conducted among OECD countries in 2019, 27 internet access on an individual basis has increased from 45.7% to 85.6% between 2005- 28 2018 [1]. As the use of the internet increases in communication between people, privacy 29 concerns also increase. For this reason, efforts to ensure privacy in communication have 30 increased. 31 Steganography is one of the data hiding sciences that aims to increase confidentiality 32 in communication [2-3]. The primary purpose of steganography is to conceal the 33 existence of a secret message. This purpose is the most crucial feature that distinguishes 34 it from other data hiding sciences. Since a media file containing a secret message will not 35 be attracted by the third party viewing the message, the secret message will not arise. 36 Therefore, researchers' interest in this subject has increased gradually. 37 Unlike other data hiding methods, the message is hidden in another media file called a 38 cover or carrier in steganography. This file type can be text, image, audio, video and, etc. 39
2 Kemal Tütüncü, Özcan Çataltaş The embedded message received by the recipient is converted to the original message by 1 reverse conversion. Since the image is used more in communication between people, the 2 studies have focused on the image file as cover media [4]. 3 Cryptography and watermarking are two other concepts used to provide digital 4 information security. In cryptography, the encrypted output of the encryption algorithm 5 attracts the third person's attention to extract the original message [5]. On the other hand, 6 although both techniques have a data hiding scheme, the intent of watermarking is 7 different from steganography. Steganography aims to conceal the existence of any secret 8 message, while watermarking makes it challenging to remove or manipulate the message. 9 Steganography algorithms can generally be divided into two categories: spatial domain 10 and transform domain [6]. In the spatial domain, the secret message's bits are embedded 11 into the cover image by directly manipulating the pixel values. On the other hand, in the 12 transform domain, a secret message is placed in the frequency coefficients calculated 13 from the cover image's pixel values using some mathematical functions. The methods 14 applied in the spatial domain have less computation and time complexity but are relatively 15 less resistant to some attacks. The algorithms in the spatial domain have a very high 16 embedding capacity with very poor perceptibility. 17 In practice, while designing a steganography algorithm, three main features must be 18 considered carefully: imperceptibility, embedding capacity, and security [7]. The 19 embedding capacity and imperceptibility of the stego image are inversely proportional. 20 As the embedding capacity increases, the quality of the stego image decreases. Therefore, 21 using compression methods before embedding the secret message will increase the 22 capacity of the cover media and reduce the detectability of the secret message. 23 The third feature, security, provides resistance against attacks that is subject to 24 steganalysis. Although steganography's main feature is that it is not suspicious, the 25 message can be obtained in case of possible detection of embedding algorithm. Therefore, 26 encrypting the secret message with known cryptology algorithms before embedding it 27 will increase communication security. 28 Another way to improve security in steganography is to embed the secret message 29 randomly instead of sequentially. For this purpose, the embedding process can be done 30 with the help of numbers generated by random number generators [8]. In literature, 31 pseudo-random generators and chaos-based generators are generally used as random 32 number generators. 33 In this study, we have hybridized the different compression methods to increase the 34 embedding capacity of the n-LSB substitution method we introduced in another study [9] 35 and with different encryption methods to increase security. Additionally, we increased 36 security by using a chaos-based (logistic map) embedding algorithm regarding 37 compressed and encrypted messages. These hybrid approaches are tested in different size 38 messages and different images, and the results were compared. It has been seen that the 39 proposed hybrid system compensated degradation, security, and capacity of classical n- 40 LSB based image steganography. 41 The paper is organized as follows: In the second part, the existing studies in the 42 literature are examined. In the third part, classical n-LSB substitution method, data 43 compression methods, data encryption methods, random number generators, and image 44 quality evaluation methods are mentioned. In the fourth section, the n-LSB substitution 45 method [9] and the proposed hybrid methods are explained. The obtained results are 46 shown in the fifth chapter. In the sixth section, the results are interpreted, and suggestions 47 are made about future works. 48
Computer Science and Information Systems 00(0):0000–0000 https://doi.org/10.2298/CSIS123456789X 3 Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid nLSB approach 4 Kemal Tütüncü, Özcan Çataltaş* 5 6 7 Faculty of Technology, Selcuk University, 42130 Konya, Turkey {ktutuncu, ozcancataltas}@selcuk.edu.tr 1 2 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Abstract. This study proposes a new hybrid n-LSB (Least Significant Bit) substitution-based image steganography method in the spatial plane. The previously proposed n-LSB substitution method by authors of this paper is combined with the Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) encryption algorithms to improve the security of the steganography, which is one of the requirements of steganography, and the Lempel-Ziv-Welch (LZW), Arithmetic and Deflate lossless compression algorithms to increase the secret message capacity. Also, embedding was done randomly using a logistic map-based chaos generator to increase the security more. The classical n-LSB substitution method and the proposed hybrid approaches based on the previously proposed nLSB were implemented using different secret messages and cover images. When the results were examined, it has been seen that the proposed hybrid n-LSB approach showed improvement in all three criteria of steganography. The proposed hybrid approach that consists of previously proposed n-LSB, RSA, Deflate, and the logistic map had the best results regarding capacity, security, and imperceptibility. 23 24 Keywords: image steganography, lossless compression, logistic map, data encryption. 25 1. Introduction 26 27 28 29 30 31 32 33 34 35 36 37 38 39 Today, the use of the internet and other technological tools in communication between people is widespread. According to a survey conducted among OECD countries in 2019, internet access on an individual basis has increased from 45.7% to 85.6% between 20052018 [1]. As the use of the internet increases in communication between people, privacy concerns also increase. For this reason, efforts to ensure privacy in communication have increased. Steganography is one of the data hiding sciences that aims to increase confidentiality in communication [2-3]. The primary purpose of steganography is to conceal the existence of a secret message. This purpose is the most crucial feature that distinguishes it from other data hiding sciences. Since a media file containing a secret message will not be attracted by the third party viewing the message, the secret message will not arise. Therefore, researchers' interest in this subject has increased gradually. Unlike other data hiding methods, the message is hidden in another media file called a cover or carrier in steganography. This file type can be text, image, audio, video and, etc. 2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 Kemal Tütüncü, Özcan Çataltaş The embedded message received by the recipient is converted to the original message by reverse conversion. Since the image is used more in communication between people, the studies have focused on the image file as cover media [4]. Cryptography and watermarking are two other concepts used to provide digital information security. In cryptography, the encrypted output of the encryption algorithm attracts the third person's attention to extract the original message [5]. On the other hand, although both techniques have a data hiding scheme, the intent of watermarking is different from steganography. Steganography aims to conceal the existence of any secret message, while watermarking makes it challenging to remove or manipulate the message. Steganography algorithms can generally be divided into two categories: spatial domain and transform domain [6]. In the spatial domain, the secret message's bits are embedded into the cover image by directly manipulating the pixel values. On the other hand, in the transform domain, a secret message is placed in the frequency coefficients calculated from the cover image's pixel values using some mathematical functions. The methods applied in the spatial domain have less computation and time complexity but are relatively less resistant to some attacks. The algorithms in the spatial domain have a very high embedding capacity with very poor perceptibility. In practice, while designing a steganography algorithm, three main features must be considered carefully: imperceptibility, embedding capacity, and security [7]. The embedding capacity and imperceptibility of the stego image are inversely proportional. As the embedding capacity increases, the quality of the stego image decreases. Therefore, using compression methods before embedding the secret message will increase the capacity of the cover media and reduce the detectability of the secret message. The third feature, security, provides resistance against attacks that is subject to steganalysis. Although steganography's main feature is that it is not suspicious, the message can be obtained in case of possible detection of embedding algorithm. Therefore, encrypting the secret message with known cryptology algorithms before embedding it will increase communication security. Another way to improve security in steganography is to embed the secret message randomly instead of sequentially. For this purpose, the embedding process can be done with the help of numbers generated by random number generators [8]. In literature, pseudo-random generators and chaos-based generators are generally used as random number generators. In this study, we have hybridized the different compression methods to increase the embedding capacity of the n-LSB substitution method we introduced in another study [9] and with different encryption methods to increase security. Additionally, we increased security by using a chaos-based (logistic map) embedding algorithm regarding compressed and encrypted messages. These hybrid approaches are tested in different size messages and different images, and the results were compared. It has been seen that the proposed hybrid system compensated degradation, security, and capacity of classical nLSB based image steganography. The paper is organized as follows: In the second part, the existing studies in the literature are examined. In the third part, classical n-LSB substitution method, data compression methods, data encryption methods, random number generators, and image quality evaluation methods are mentioned. In the fourth section, the n-LSB substitution method [9] and the proposed hybrid methods are explained. The obtained results are shown in the fifth chapter. In the sixth section, the results are interpreted, and suggestions are made about future works. Compensation of degradation, security, and capacity of LSB substitution ... 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 2. 3 Related Works In this study, the proposed hybrid methods have been compared with the classical LSB substitution method as can be seen in the following section. Thus, we will include studies in the literature that modified the LSB substitution method or combined it with compression and encryption methods. In our previous study [9], the classical n-LSB substitution method was improved and a new version of n-LSB was proposed and tested on different images. Obtained stego images were compared with stego images obtained by the classical n-LSB substitution method. The proposed n-LSB method caused an increase of 6.6% in the Peak Signal to Noise Ratio (PSNR) value regarding the classical n-LSB substitution method. In their study, Rajput et al. used RSA cryptography and Spatial Orientation Tree Wavelet (STW) compression methods for hiding a secret message in color and gray-scale images. The secret message was encrypted using the RSA encryption algorithm, then embedded in the cover image compressed by the STW compression algorithm. They tested their method using 8 different cover images and obtained PSNR values ranging from 77.3 dB to 83.9 dB [10]. Chen has proposed a new module-based LSB substitution method. In this method, the repeated bits in the secret message are detected and the repeated bits are coded with a code. He tested his method by hiding 7 different gray-scale images at 256x512 pixel resolution in 2 different gray-scale images at 512x512 pixel resolution and obtained the PSNR values ranging from 34dB to 36dB in the test result [11]. Akhtar and colleagues [12] proposed a new module-based LSB steganography method by developing the algorithm proposed by Chen [11]. They tested their method by hiding 10 different gray-scale images with 256x256 pixel resolution in 2 different gray-scale cover images with 512x512 pixel resolution. They obtained PSNR values ranging from 34dB to 40dB in the test result. According to the classical LSB method, they obtained increases of between 3% and 25% regarding PSNR. At the same time, they also applied the method suggested by Chen and emphasized that they achieved a higher PSNR value in their method. Chikouche combined the classical LSB substitution method with the Advanced Encryption Standard (AES) cryptography method and the Deflate compression method in his work. The LSB substitution method was implemented randomly with a pseudorandom generator rather than sequentially. They embedded 3264-bit data in a color cover image with 512x512 pixel resolution and emphasized that their method is better than according to the security criterion [13]. In their study, Manjula and Shivakumar compressed the message they encrypted with AES and Elliptic Curve Cryptography (ECC) with the LZW algorithm and embedded it with the classical LSB substitution method. 32-bit messages were hidden in different images and the PSNR values ranging from 79dB to 81dB values were obtained. Then the messages with a length ranging from 32 bits to 288 bits were hidden in different images and the PSNR values ranging from 77dB to 81dB were obtained. Also, they stated that they have 2 times security because the message is encrypted twice [14]. Kasapbaşi proposed a new image steganography scheme including chaos-based Huffman encoding algorithm and fractal encryption. Firstly, he calculated the frequency of the alphabets and other characters in a section of Turkish newspaper and encoded them with Huffman encoding. He encoded the compressed text with random numbers generated by the logistic map. The message was embedded in the selected LSBs of the 4 Kemal Tütüncü, Özcan Çataltaş 1 2 3 4 5 6 7 8 cover image. The proposed method was found to be successful in terms of encryption [15]. Rachmawanto et al. proposed a hybrid method consists of the AES cryptology method and classical LSB substitution method. They tested their method and obtained PSNR values ranging from 58 dB to 80 dB [16]. Supriadi Rustad et al. proposed a new image steganography method based on finding an adaptive pattern in inverted LSB steganography. They obtained the PSNR value ranges from 52.49 to 57.45, and the SSIM ranges from 0.9991 to 0.9999 [7]. 9 3. Materials and Methods 10 3.1. LSB Substitution Method 11 12 13 14 15 The basic principle of the LSB substitution method is to replace the LSB of each pixel with the message bit in the order of the cover image [17]. It can be applied to RGB or gray-scale images. The value of each pixel, which consists of 8 bits, 0 to 255, is either increased by 1, decreased by 1, or unchanged. A change of ±1 in the image pixel will not make a big difference on the image. 16 3.2. 17 18 19 20 21 22 23 24 25 According to the compression formats, data compression methods are divided into two categories: lossy compression and lossless compression [18]. If the original data can be recovered without any changes after compressing the data, this type of compression is called lossless compression. Lossless compression methods ensure that the original data is preserved precisely and that no detail is desired to be lost. In the other category of compression algorithms, lossy compression, original data cannot be obtained precisely after the recovery. In this study, LZW, Arithmetic, and Deflate algorithms had been chosen to compress the message before it was hidden. Detailed information about these algorithms is shown below. 26 Lempel-Ziv-Welch 27 28 29 30 31 32 33 34 35 The LZW algorithm is a compression method derived from the LZ78 algorithm [18]. It was discovered in 1984 by Terry A. Welch and introduced in his paper titled “A Technique for High-Performance Data Compression” (1984). There is no preset dictionary in the LZW compression method. Dictionary is created dynamically according to the context to be compressed. For this reason, when the LZW method is used to compress the secret message in steganography, the sender does not need to transmit a dictionary to the recipient. Once the recipient has extracted the compressed message from the stego image, the dictionary will be dynamically created, and the secret message will be obtained. Data Compression Methods Compensation of degradation, security, and capacity of LSB substitution ... 5 1 Arithmetic 2 3 4 5 6 7 8 The primary purpose of arithmetic coding is to assign an interval to each character. Then, this range is assigned a decimal number. The algorithm starts with 0 and 1 intervals. After reading each character in the input data, the interval is divided into subparts as a smaller range than the input character's probability. This sub-range becomes the new range and is partitioned according to the probability of that character. This process is repeated for each input character. When this is done, every floating point in the last interval uniquely represents the input data [18-20]. 9 Deflate 10 11 12 13 14 15 16 17 18 19 Deflate is a popular compression method used in well-known algorithms such as Zip and Gzip. Deflate method is used by many important programs such as PNG image, HTTP protocol, and PDF. The Deflate method is a dictionary-based compression technique based on LZ77 and Huffman coding. There are three different modes in Deflate method. In the first mode, input symbols are subdivided without compression. This mode is used for non-compressible files or when someone wants to partition a file without compression. The second mode is a single-pass compression solution. In this mode, a predetermined coding table is used during coding. This mode is used in real-time applications [21]. The third mode of Deflate is a two-pass compression solution based on the dictionaries produced according to the statistical properties of the input file. 20 3.3. 21 RSA 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 The RSA encryption algorithm was proposed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977 [22]. The expansion of the RSA consists of the initials of the names of the developers. The RSA algorithm is one of the asymmetric encryption methods. Two different keys are used for encryption and decryption, but these two keys are related to each other. The key used for encryption is a public key and is known by everyone. The key used for decryption is a private key and is only found on the receiving side [23]. The encryption steps of the RSA algorithm are as follows: 1. Two prime numbers, such as p and q, are input parameters. 2. The value of 𝑛 = 𝑝 ∗ 𝑞 is the base value, and 𝜑(𝑛) = (𝑝 − 1) ∗ (𝑞 − 1) Euler value is calculated. 3. The number of 𝑒 (public keys) is selected as 1 < 𝑒 < 𝜑(𝑛) (𝜑(𝑛) is a prime number). 4. d value is selected so that 𝑑 ∗ 𝑒 = 1 𝑚𝑜𝑑(𝜑(𝑛)). This value is a private key. 5. The 𝑐 = 𝑚𝑒 𝑚𝑜𝑑(𝑛) formula encrypts each message character. To extract an encrypted message using the RSA algorithm, the first four steps are applied in the same way, and then the secret message is obtained with the formula 𝑚 = 𝑐 𝑑 𝑚𝑜𝑑(𝑛). Data encryption methods Kemal Tütüncü, Özcan Çataltaş 6 1 RC5 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 The RC5 algorithm is one of the symmetric encryption algorithms. It was introduced by Ron Rivest in 1994. The RC5 algorithm is simple to implement because it uses basic mathematical and logical operators. Furthermore, the variable key length distinguishes RC5 from traditional encryption methods such as Data Encryption Standard (DES). The implementation steps of the RC5 encryption algorithm are presented below [24, 25]: 1. Firstly, define w, r, and Key parameters. 2. Obtain P and Q constants. 39 Data encryption standard (DES) 40 41 42 43 44 45 DES was one of the symmetric encryption methods introduced by the National Institute of Standards & Technology (NIST) in 1976 for all government communications. It has also been used for a long time in bank transactions [26]. In the DES algorithm, the input text is divided into blocks. Each has a 64-bit message. A 64-bit key is required in the encryption process. Eight bits of this key are used as parity bits. Encryption is done in 16 rounds. Each round uses a new key that is the 48-bit length. P=odd(e-2)2w Q=odd(Φ-2)2w 3. Convert Key K byte to words. for i=b-1 to 0 L[i/u] = (L[u/i] << 8) + K[i] 4. Initialize key-independent array, S. S[0] = P for i = 1 to 2(r+1)-1 S[i] = S[i-1] + Q) 5. Mix secret key in the L and S array. i = j = 0 A = B = 0 do 3 * max(t, c) times: A = S[i] = (S[i] + A + B) << 3 B = L[j] = (L[j] + A + B) << (A + B) i = (i + 1) % t j = (j + 1) % c 6. Divide the input text into w-bit blocks (A and B are two of these blocks) and encrypt each block. A = A + S[0] B = B + S[1] for i = 1 to r do: A = ((A ^ B) << B) + S[2 * i] B = ((B ^ A) << A) + S[2 * i + 1] 7. Decrypt using A and B. for i = r down to 1 do: B = ((B - S[2 * i + 1]) >> A) ^ A A = ((A - S[2 * i]) >> B) ^ B B = B - S[1] A = A - S[0] Compensation of degradation, security, and capacity of LSB substitution ... 1 2 3 These keys are obtained using the input key. The block diagram of the DES algorithm is shown in Fig. 1. 4 5 Fig. 1. Block diagram of DES encryption algorithm 6 3.4. 7 8 9 10 11 12 13 14 15 16 17 18 19 7 Chaos generator A random number is a series of numbers or symbols that are not predictable with random luck and do not repeat in a particular pattern. Random number generators have many field-critical presets, such as secure communications, data transmission, and storage. Random number generators are examined in two categories: pseudo-random generators and real random generators. Chaos-based generators are used more extensively than pseudo-random generators because they are real random generators. Since the chaos generators are very sensitive to input parameters, the numbers they will produce constantly are not predictable. For this reason, it is frequently used in information security applications [27]. One of the simple chaos systems widely used and applied in the literature is the logistic map. The formula of the logistic map is as follow: 𝑥𝑘+1 = 𝜇 ∗ 𝑥𝑘 ∗ (1 − 𝑥𝑘 ) (1) Here, 𝑥0 and 𝜇 are input parameters. When 3.57 < 𝜇 ≤ 4, the system goes into a chaotic state and generates random numbers. 20 3.5. Image quality evaluation criteria 21 22 Image evaluation criteria are methods used to learn the amount of change in the cover image. The image evaluation criteria used in this study are explained below. 23 Peak Signal-to-Noise Ratio (PSNR) 24 25 26 27 28 29 PSNR is one of the essential criteria used to evaluate image quality. The PSNR is the ratio of the power of the highest possible power of the cover image to the power of the difference between the cover image and the stego image. A high PSNR value means little distortion in the stego image, while a low PSNR value means more distortion in the stego image [28]. The PSNR value can be calculated using the following formula: 255 𝑃𝑆𝑁𝑅 = 20 ∗ 𝑙𝑜𝑔 (2) √𝑀𝑆𝐸 8 Kemal Tütüncü, Özcan Çataltaş 𝑚 𝑛 2 (𝑆(𝑖, 𝑗) − 𝐼(𝑖, 𝑗)) 𝑀𝑆𝐸 = ∑ ∑ 𝑚∗𝑛 (3) 𝑖=1 𝑗=1 1 Average difference 2 3 4 5 The average difference (AD) metric equals the mean of the sum of the differences between the cover image pixels and the stego image pixels. The low average difference value means that there is less distortion in the stego image. The average difference formula is: 𝑚 𝑛 𝑆(𝑖, 𝑗) − 𝐼(𝑖, 𝑗) 𝐴𝐷 = ∑ ∑ (4) 𝑚∗𝑛 𝑖=1 𝑗=1 6 7 8 9 10 11 12 Universal Image Quality Index (UIQI) UIQI (Universal Image Quality Index) is an index that attempts to model any distortion on the image [29]. These distortions can be in the form of a combination of the following three factors: correlation, luminance distortion, and contrast distortion. The UIQI value is between [-1, 1]. 1 means the images are identical. UIQI formula is shown in (5). 𝜎𝑥𝑦 2𝜎𝑥 𝜎𝑦 2𝑥̅ 𝑦̅ 𝑈𝐼𝑄𝐼 = ∗ ∗ (5) 𝜎𝑥 𝜎𝑦 𝑥̅ 2 + 𝑦̅ 2 𝜎𝑥 2 + 𝜎𝑦 2 Here, 𝜎 denotes standard deviation and 𝑥̅ and 𝑦̅ denote the average of the cover and stego images, respectively. 13 4. Proposed Methods 14 15 16 17 18 The classical 1-LSB, 2-LSB, and 3-LSB substitution methods are the most common methods used in steganography because of their ease of implementation and high capacity. Many different methods developed are built on these methods. However, they need to be improved because it is easy to detect, and third-person can directly access the message when it is detected. 19 4.1. 20 21 22 23 24 25 26 27 The pseudo-code of the application steps of the n-LSB substitution method [9] by the author of this paper is presented in Fig. 2. The proposed n-LSB method reduces the excess change between the cover and stego image pixels while applying the classical n-LSB substitution methods. The proposed n-LSB method has only been applied to 2-LSB and 3-LSB methods because there is no effect on the 1-LSB method and also 4 and more bit substitution methods that are not used in the literature. The 2 and 3-bit implementation of the proposed n-LSB method is described and illustrated below. Proposed n-LSB Method Compensation of degradation, security, and capacity of LSB substitution ... Input: C,S,n Output: S C: Cover image pixels S: Stego image pixels n: Embedding method (n=2, 3) 𝐶(𝑝)𝑖 , 𝑆(𝑝)𝑖 : ith bit of related pixel; i=1,..,8 For each p in every pixel of C,S If 𝐶(𝑝) − 𝑆(𝑝) > 2(𝑛−1) If 𝑆(𝑝)𝑛+1 = 0 𝑆(𝑝)𝑛+1 = 1 Elseif 𝑆(𝑝)𝑛+2 = 0 𝑆(𝑝)𝑛+2 = 1 𝑆(𝑝)𝑛+1 = 0 … Elseif 𝑆(𝑝)8 = 0 𝑆(𝑝)8 = 1 𝑆(𝑝)7 = ⋯ = 𝑆(𝑝)𝑛+1 = 0 End If Elseif 𝐶(𝑝) − 𝑆(𝑝) < −2(𝑛−1) If 𝑆(𝑝)𝑛+1 = 1 𝑆(𝑝)𝑛+1 = 0 Elseif 𝑆(𝑝)𝑛+2 = 1 𝑆(𝑝)𝑛+2 = 0 𝑆(𝑝)𝑛+1 = 1 … Elseif 𝑆(𝑝)8 = 1 𝑆(𝑝)8 = 0 𝑆(𝑝)7 = ⋯ = 𝑆(𝑝)𝑛+1 = 1 End If End If End For each 1 2 Fig. 2. The pseudo-code of the proposed n-LSB substitution method 3 Proposed 2-LSB substitution method 4 5 6 7 8 9 10 11 12 9 When 𝑛 = 2 in the pseudo-code given in Fig. 2, the secret message is embedded in the cover image using the classical 2-LSB substitution method. At the end of the embedding process, the difference between the cover image and the stego image pixels is examined. Since at most two LSBs of the cover image pixels can be changed, the decimal difference will be one of 3, 2, 1, 0, -1, -2, -3. If this difference is -2, -1, 0, 1, or 2, then the pixel of the stego image is left unchanged. In another case, if this difference is 3, all bits from the 3rd LSB of the stego image are examined, the first 0 is converted to 1, and the previous 1s are converted to 0. So the related pixel of the stego image is added to the decimal number 4, the difference between the pixels falls from 3 to -1. If there are no 0's between Kemal Tütüncü, Özcan Çataltaş 10 1 2 3 4 5 6 7 8 the 3rd and 8th bits (most significant bit), the related pixels are left unchanged in the stego image. If the difference is -3, all bits from the 3rd bit of the related pixel are examined, the first 1 encountered is converted to 0, and the previous 0s are converted to 1. Thus, the decimal number 4 is subtracted from the corresponding pixel, and the difference between the pixels falls from -3 to 1. If there is no 1 between the 3rd and 8th bits, then the corresponding pixel is left unchanged in the stego image. With this method, the deterioration of the pixels where the degradation is excessive is reduced [9]. Examples of the implementation of the proposed 2-LSB are shown in Table 1. 9 10 11 Table 1. Proposed 2-LSB substitution example. The changed bits of cover image pixel obtained after embedding with the 2-LSB method and the bits of stego image pixel obtained after applying the proposed compensation method were shown in red and green color, respectively Pixel No Cover image Message to be embedded (2-bit) Stego image Difference New stego image New difference 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 01111001 00100011 10010000 00000001 11000011 11000010 00101110 11111000 00110000 11010100 11100000 00100000 01010001 01101101 11101001 11001101 01110111 01111110 01001101 10000011 01 10 11 10 00 11 01 01 10 11 11 10 01 10 10 01 00 10 10 10 01111001 00100010 10010011 00000010 11000000 11000011 00101101 11111001 00110010 11010111 11100011 00100010 01010001 01101110 11101010 11001101 01110100 01111110 01001110 10000010 0 1 -3 -1 3 -1 1 -1 -2 -3 -3 -2 0 -1 -1 0 3 0 -1 1 01111001 00100010 10001111 00000010 11000100 11000011 00101101 11111001 00110010 11010011 11011111 00100010 01010001 01101110 11101010 11001101 01111000 01111110 01001110 10000010 0 1 1 -1 -1 -1 1 -1 -2 1 1 -2 0 -1 -1 0 -1 0 -1 1 12 13 14 15 16 17 18 19 20 In Table 1, randomly generated 2-bit messages were hidden in the randomly generated 20 pixels cover image pixels consisting of 8 bits by the 2-LSB method. After the embedding process, the differences between the pixels of the cover image and the stego image were examined. If the difference is -3 or 3, the proposed method was applied. As shown in the table, the difference in 5 of 20 pixels is -3 or 3, so the pixels outside these 5 pixels were not changed. The AD before the enhancement was 1.2, but after the enhancement, this difference was reduced to 0.9. Thereby the amount of distortion in the image was reduced. 21 Proposed 3-LSB substitution method 22 23 24 25 When 𝑛 = 3 in the pseudo-code given in Fig. 2, the secret message is embedded in the cover image using the classical 3-LSB substitution method. At the end of the embedding process, the difference between the pixels of the cover image and the stego image is examined. Since at most three LSBs of the cover image can be changed, the difference Compensation of degradation, security, and capacity of LSB substitution ... 11 1 2 3 4 5 6 7 8 9 10 11 12 13 14 will get one of the values from -7 to 7. If the decimal difference between the pixels is -4, -3, -2, -1, 0, 1, 2, 3, or 4, then the pixel of the stego image is left unchanged. If the difference is 5, 6, or 7, all bits from the 4th bit of that pixel are examined, the first 0 value encountered is converted to 1, and the previous 1s are converted to 0. So the related pixel is added to the decimal number 8, and the difference between the pixels falls from 5, 6, 7 to -3, -2, and -1, respectively. If there is no 0 value between the 4th and 8th bits, the related pixel of the stego image is left unchanged. Similarly, if the difference is -5, -6, or -7, all bits of the pixel are examined from the 4th bit, the first 1 value encountered is converted to 0, and the previous 0s are converted to 1. Thus, the decimal number 8 is subtracted from the related pixel, the difference between the pixels falls from -5, -6, -7 to 3, 2, and 1, respectively. If there is no 1 value between the 4th and 8th bits, then the related pixel is left unchanged. With this method, the deterioration of the pixels where the degradation is excessive is reduced [9]. Examples of the implementation of the proposed compensation method for 3-LSB are presented in Table 2. 15 16 17 Table 2. Proposed 3-LSB substitution example. The changed bits of cover image pixel obtained after embedding with the 3-LSB method and the bits of stego image pixel obtained after applying the proposed compensation method were shown in red and green color, respectively 18 19 20 21 22 23 24 25 26 Pixel No Cover image Message to be embedded (3-bit) Stego image Difference New stego image New difference 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 01111001 00100011 10010000 00011111 11000011 11000010 00101110 11111000 00110000 11010100 11100111 00100000 01010001 01101101 11101001 11001101 01110111 01111110 01001111 10000011 111 001 111 010 100 111 111 001 010 110 000 101 101 101 110 100 001 111 001 001 01111111 00100001 10010111 00011010 11000100 11000111 00101111 11111001 00110010 11010110 11100000 00100101 01010101 01101101 11101110 11001100 01110001 01111111 01001001 10000001 -6 2 -7 5 -1 -5 -1 -1 -2 -2 7 -5 -4 0 -5 1 6 -1 6 2 01110111 00100001 10001111 00100010 11000100 10111111 00101111 11111001 00110010 11010110 11101000 00011101 01010101 01101101 11100110 11001100 01111001 01111111 01010001 10000001 2 2 1 -3 -1 3 -1 -1 -2 -2 -1 3 -4 0 3 1 -2 -1 -2 2 In Table 2, randomly generated 3-bit messages were hidden on the randomly generated 20 cover image pixels consisting of 8 bits by the 3-LSB method. After the embedding process, the differences between the pixels of the cover image and the stego image were examined. If the difference is -7, -6, -5, 5, 6, or 7, the proposed method was applied. As shown in the table, the difference in 9 of 20 pixels is -7, -6, -5, 5, 6, or 7, so the pixels outside these 9 pixels were not changed in the stego image. The AD before the enhancement was 3.45, but after the enhancement, this difference was reduced to 1.85. Thereby the amount of distortion in the stego image was reduced. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 12 Kemal Tütüncü, Özcan Çataltaş 4.2. Proposed hybrid-1 With the proposed n-LSB method [9], the degradation of pixels of the stego image has been reduced, which is one of the three basic principles of steganography. However, there has been no change in the other principles of steganography, which are security and capacity. To improve these two criteria, existing compression and encryption methods are combined with the proposed n-LSB method. Compressing the secret message before embedding it in the cover image will reduce the degradation of the stego image as it will reduce the number of secret message bits to be embedded and increase the message length that can be embedded on the cover image. Also, since the 3rd person will not know the used compression algorithm, the secret message will not be directly available, even if the hidden data in the stego image is recovered. For this purpose, the message is compressed using text compression algorithms before being embedded. Three different algorithms, LZW, Arithmetic, and Deflate, have been applied as text compression algorithms and compared among themselves. Embedding the message sequentially in the cover image makes it easier to extract it by the 3rd person. Encrypting the message before embedding it is a big solution, but since the embedding process is sequential, the 3rd person can quickly get the encrypted message. Although cryptography methods are challenging to break, it is not impossible to break. For this reason, the secret message may be passed on to other people. To overcome this problem, the message in steganography is often randomly embedded in the image with various random number generators rather than sequentially. In our proposed hybrid n-LSB approach, random numbers are generated with the logistic map-based chaos generator to overcome this problem, and the message is randomly embedded in the cover image. The 𝑥0 and 𝜇 values of the chaotic generator are used as input parameters. For this reason, these parameters must be transmitted to the recipient to extract the hidden message. 29 30 Fig. 3. The flowchart of the proposed hybrid-1 method 31 32 33 34 35 36 To eliminate the shortcomings of the n-LSB method and obtain a safer embedding algorithm, two different hybrid methods were created. In the first hybrid method, named as proposed hybrid-1, the secret message was compressed using Deflate compression algorithm, and then this compressed secret message was embedded to the cover image randomly using the proposed 2-LSB and 3-LSB substitution method and logistic mapbased chaos generator. The reason for choosing Deflate compression algorithm is being Compensation of degradation, security, and capacity of LSB substitution ... 13 1 2 3 superior to the other two methods in compression ratios according to applications presented in Results Section. The flowchart of the proposed hybrid-1 method was shown in Fig. 3. 4 4.3. 5 6 7 8 9 10 Proposed hybrid-2 Encrypting the message before embedding it in the cover image will make it difficult to reach the secret message, even if the third party can completely get the information embedded in the image. For this purpose, the message is encrypted with different encryption algorithms. RSA, DES, and RC5 algorithms were tested and compared for this purpose. 11 12 Fig. 4. The flowchart of the proposed hybrid-2 method 13 14 15 16 17 18 19 20 21 22 In this hybrid method, named as proposed hybrid-2, in addition to the proposed hybrid1 method, the secret message was encrypted before compressing process using the RSA encryption algorithm. The reasons why the RSA algorithm is chosen are its widespread use and being asymmetric encryption algorithm. Additionally, the RSA encryption algorithm is superior to the other two methods both in the average encryption time and in the file size to be encrypted per second according to applications presented in Results Section. The (𝑝, 𝑞) values required to generate the public and private keys in RSA encryption are used as input parameters. For this reason, for the receiver to reach the secret message, the values p and q must be transmitted to the receiver. The flowchart of the proposed hybrid-2 method was shown in Fig. 4. 23 5. 24 25 26 27 28 29 30 In this section, the results obtained by applying the classical LSB substitution and proposed hybrid n-LSB approaches are evaluated. For this aim, three different text files and four different cover images were used. The cover images used are shown in Fig. 5. These images are RGB 24-bit images with a resolution of “Lena” 225x225, “Mandrill” 512x512, “Cat” 960x603, and “Peppers” 600x600 pixels. These images are in the ".bmp" file format. The methods we propose in this study are independent of these images and can be applied to any desired image without any constraints. The main reasons for Results Kemal Tütüncü, Özcan Çataltaş 14 1 2 3 4 5 6 7 8 9 10 choosing these images as cover are being in different resolutions and well-known in the literature. Three text files with sizes 6.95 kB, 13.59 kB, and 17.13 kB were selected as secret messages. These text files contain the standard English alphabet as well as some special characters (., ?, -, !, “”, , ). When the results are evaluated, a comparison is made only with the classical LSB substitution method, as seen in the literature. The reason is that each of the methods in the literature is tested on different cover images using different messages. There is no common ground between methods proposed by other authors in the literature. a) 11 b) c) Fig. 5. Cover images used to test proposed methods d) 12 5.1. 13 14 15 16 17 In the proposed hybrid methods, the secret message file is compressed using different compression methods before being hidden in the cover image. The new message length and the compression rates resulting from the compression are shown in Table 3. The compression ratio values were calculated according to (6). 18 19 20 21 22 23 24 25 26 Comparison of data compression methods %𝐶𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑖𝑜𝑛 𝑅𝑎𝑡𝑖𝑜 = 𝐼𝑛𝑝𝑢𝑡 𝑆𝑖𝑧𝑒 ∗ 100 𝑂𝑢𝑡𝑝𝑢𝑡 𝑆𝑖𝑧𝑒 (6) The original message files with 56980, 111405, and 140364-bit lengths were compressed with the LZW algorithm; their size decreased to 38448, 72969, and 84643bit, respectively. Compression ratios were obtained as 148.2%, 152.67% and 165.83% respectively. It is seen that as the message length increases, the compression ratio increases, and the highest compression ratio is obtained when the Text-3 file is compressed with LZW. The reason is that as the message length increases, the possibility of finding new words added to the dictionary increases. In other words, when there are 2, 3, or more character words added to the dictionary, the probability of encountering these Compensation of degradation, security, and capacity of LSB substitution ... 15 1 2 3 4 5 6 7 8 words increases as the size of the message increases so that the coded words in the dictionary can be used instead of these words. With the arithmetic algorithm, the secret message files, which are 56980, 111405, and 140364-bit length, have been reduced to the size of 35448, 69361, and 88109 bits respectively. Compression ratios were calculated as 160.74%, 160.62% and 159.31%, respectively. It is seen that as the message size increases, the compression ratio decreases, and the highest compression ratio is obtained when the Text-1 file is compressed with the arithmetic algorithm. 9 Table 3. Comparison of compression algorithms Filename Uncompressed size (bit) Text 1 56980 Text 2 111405 Text 3 140364 LZW Arithmetic Compression ratio 35448 160.74% 69361 160.62% 88109 159.31% 38448 148.20% 72969 152.67% 84643 165.83% Deflate 29496 193.18% 56832 196.03% 65744 213.50% 10 11 12 13 14 15 16 17 18 19 20 21 With the Deflate algorithm, the original message files, which are 56980, 111405, and 140364-bits in length, have been reduced to the size of 29496, 56832, and 65744 bits, respectively. Compression ratios were calculated as 193.18%, 196.03% and 213.50%, respectively. Since the Deflate algorithm is a hybrid algorithm consisting of Huffman and LZ77 codes, the highest compression ratios according to other algorithms were obtained with this algorithm. Also, as the message length increased, the compression ratio increased, and the highest compression ratio was obtained when the Text-3 file was compressed. Since the highest compression ratio between LZW, Arithmetic, and Deflate algorithms is obtained by Deflate method, it is used as a compression method in the proposed hybrid1 and hybrid-2 algorithms. 22 5.2. 23 24 25 26 Determining the security and success of encryption algorithms is a complex process. To compare such algorithms on a common basis, encryption times are generally used. Therefore, the encryption times of the RSA, RC5, and DES encryption algorithms used in this study were calculated using texts of different lengths and are shown in Table 4. 27 Table 4. Comparison of encryption times of RSA, RC5, and DES Comparison of data encryption methods Text Size Text-1 (7122 byte) Text-2 (13925 byte) Text-3 (17545 byte) Average Bytes/sec RSA RC5 DES 10.23 24.91 21 20.05 48.29 40.05 24.95 60.97 50.42 18.41 698.75 44.72 287.65 37.15 346.27 16 Kemal Tütüncü, Özcan Çataltaş 1 2 3 4 When Table 4 is examined, it can be seen that the RSA encryption algorithm is superior to other methods both in the average encryption time and in the file size to be encrypted per second. Therefore, RSA was chosen as the encryption method in the proposed hybrid2 algorithm. 5 5.3. Test results 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Three different secret message files were embedded in 4 different cover images using the classical LSB substitution method, the proposed n-LSB method [9], and proposed hybrid methods. The stego images were compared with the cover images by using image comparison criteria, and the results are shown in the sub-sections. The following algorithms are used for embedding: • Classical 1-LSB, 2-LSB, and 3-LSB methods • Proposed n-LSB method (consist of proposed 2-LSB or 3-LSB methods) [9] • Proposed hybrid-1 (consist of proposed 2-LSB or 3-LSB method combined with Deflate compression algorithm and logistic map-based random embedding method) • Proposed hybrid-2 (consist of proposed 2-LSB or 3-LSB method combined with Deflate compression algorithm, RSA encryption algorithm, and logistic map-based random embedding method) The input parameters used during embedding are: • RSA encryption: 𝑝 = 3, 𝑞 = 41. • Logistic map: 𝑥0 = 0.675 and 𝜇 = 3.9763. 21 PSNR 22 23 24 25 26 27 28 29 30 31 32 33 34 The cover and stego images were submitted to the PSNR test and the obtained results are shown in Appendix. Since the PSNR value is the ratio of the peak signal to the noise in the image, the higher PSNR value means that the image degradation is less. When the obtained results are examined, it is seen that the PSNR values of the proposed 2-LSB and 3-LSB methods are higher than the classical 2-LSB and 3-LSB methods. It can be said that the proposed hybrid-1 is better than the proposed n-LSB method and proposed hybrid-2. The second highest PSNR value was obtained by embedding Text-1 in Image4 by the proposed hybrid-1 2-LSB method with 64.86235 dB and comes after the classical 1-LSB method. Also, the highest increase was 10.8426% (from 42.96577 dB to 47.62437 dB) when the Text-3 file was embedded to Image-1 by proposed hybrid-1 3-LSB compared to the classical 3-LSB method. It can be said that the highest PSNR increase can be achieved when the high-size message file is embedded into the low-resolution image. 35 Average Difference 36 37 38 39 The stego images and cover images obtained after applying the proposed and classical LSB substitution methods are compared according to the AD criterion, and the obtained results are presented in Appendix. The average difference is equal to the average of differences between the cover and stego image pixels. Since the stego image is desired to Compensation of degradation, security, and capacity of LSB substitution ... 17 1 2 3 4 5 6 be similar to the cover image, it is expected that the average difference value is small. When the obtained results are examined, embedding Text-1 message on image-4 is obtained with the smallest mean difference value of 0.042 by the proposed hybrid-1 2LSB algorithm. It is also seen that the proposed hybrid-1 is superior to other classical and proposed methods. However, as the resolution of the image increases or the length of the secret message decreases, the average difference value decreases. 7 UIQI 8 9 10 11 12 13 14 15 16 17 18 19 The stego images and cover images obtained after applying the proposed and classical LSB substitution method were compared according to the UIQI criterion, and the obtained results are shown in Appendix. It is preferable to have a high UIQI value because the difference between the stego image and the cover image is desired to be small. The classical 1-LSB method is the least corrupted method because it only changes the last pixels of the cover image. When we compare the proposed n-LSB method with the classical 2-LSB and 3-LSB algorithms, the proposed n-LSB method yields higher UIQI values. Additionally, the results obtained by the proposed hybrid-1 are compatible with the results obtained by the proposed n-LSB. However, since the UIQI value consists of a combination of correlation, luminance distortion, and contrast distortion, the results show differences in different cover images. Therefore, it is not possible to make a clear conclusion about which method is superior according to the UIQI value. 20 5.4. 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Capacity can be defined as the maximum amount of secret messages hidden in the cover image. Thus, it is essential to check the capacity of images when steganography methods are compared. The effect of data compression on stego image capacity is shown in Table 5. The capacity values shown here are estimated values calculated from the compression ratios calculated in Table 3. Besides, since the application of encryption algorithms and other embedding methods such as proposed n-LSB and classical n-LSB do not affect the embedding capacity, only the classical 3-LSB method was used as an embedding method. According to Table 5, the highest capacity increase was achieved by the Deflate algorithm. With this algorithm, the capacity of image-4 was increased from 635.98 kB to 1357.81 kB, a 113.5% increase was obtained. Furthermore, according to the results shown in Table 3, it was obtained that the compression ratio increased as the message size increased. Accordingly, it is expected that with the LZW and the Deflate algorithm, the cover images will have a larger message capacity than the values shown in Table 5. 35 Table 5. Capacity test results Capacity test Image No Image 1 Image 2 Image 3 Image 4 Uncompressed Capacity (kB) 55.62 288.00 395.51 635.98 Compressed Capacity (Expected) (kB) LZW Arithmetic Deflate 92.23 89.40 118.75 477.59 462.93 614.88 655.87 635.74 844.41 1054.64 1022.27 1357.81 18 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 6. Kemal Tütüncü, Özcan Çataltaş Conclusion and Discussion In this paper, steganography methods which are one of the information security methods are examined, and a new hybrid method in image steganography is proposed. This method, which we propose, is based on the proposed n-LSB substitution method of the authors of this paper and tries to reduce the pixel differences between cover and stego image. In this regard, improvement in the perceptibility criterion, one of the three main criteria of steganography, has been achieved and confirmed with an implemented test. Since the proposed n-LSB method is based on the LSB substitution method, the third party can extract the secret message easily. To solve this problem, instead of embedding the message bits in sequence, they are randomly embedded using a chaos-based random number generator. To increase the security a step ahead, RSA, RC5, and DES encryption algorithms are used to encrypt the secret message before being embedded. Then, data compression methods were combined with the proposed n-LSB method to provide improvement in both the capacity criterion and compensating for the increase in data size that would result in the use of encryption algorithms. Three compression methods, LZW, Arithmetic, and Deflate, were applied. The best compression ratio was obtained by the Deflate algorithm. For this reason, the secret message was compressed with the Deflate algorithm before being hidden in the cover image. These proposed hybrid methods based on the proposed n-LSB method have been tested by hiding three message files in different sizes in 4 cover images with different resolutions and sizes. The highest PSNR value was obtained as 64.86 dB with proposed hybrid-1 (2LSB), and the highest PSNR increase rate was 10.84% with proposed hybrid-1 (3-LSB) when the stego images and the cover images were compared according to image quality evaluation criteria. PSNR values were higher in all the different combinations of the proposed n-LSB method than in the classical LSB method. Moreover, the use of the Deflate compression algorithm in the proposed hybrid-1 method resulted in an increase of 113.5% in the embedding capacities of the cover images. Thanks to the proposed hybrid methods, the shortcomings in using the n-LSB method have been eliminated, and more reliable methods have been obtained for data hiding. The proposed n-LSB and hybrid methods can be used regardless of the message and the cover image, as long as the secret message size does not exceed the capacity of the cover image. The authors of this paper study the effects of the application of the combination of different compression and encryption algorithms with the proposed n-LSB method to different color spaces. Furthermore, the authors think that investigating the applicability of the proposed methods in the frequency domain will be a good research step. Compensation of degradation, security, and capacity of LSB substitution ... 1 Appendix 2 Table 6. Test results obtained by applying proposed methods Metric Image No PSNR Image 1 Image 2 Image 3 Image 4 Image 1 AD Image 2 Image 3 Image 4 Image 1 UIQI Image 2 Image 3 Image 4 3 4 5 6 7 8 9 10 11 Text No Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Text-1 Text-2 Text-3 Classical 1-LSB 55.37 52.46 51.46 62.48 59.61 58.60 63.83 60.93 59.96 65.94 63.06 62.07 0.0625 0.1226 0.1544 0.0121 0.0236 0.0298 0.0089 0.0174 0.0218 0.0055 0.0107 0.0134 0.9914 0.9867 0.9847 1 0.9999 0.9999 0.9994 0.9999 0.9971 0.9989 0.9972 0.9961 2-LSB 51.30 48.41 47.39 58.51 55.58 54.59 59.82 56.91 55.89 61.94 59.03 58.04 0.0793 0.1548 0.1953 0.0152 0.0297 0.0375 0.0112 0.0218 0.0275 0.0069 0.0134 0.0169 0.9789 0.9690 0.9629 0.9999 0.9995 0.9994 0.9940 0.9991 0.9962 0.9945 0.9922 0.9962 3-LSB 46.85 43.98 42.97 53.99 51.10 50.14 55.36 52.44 51.48 57.46 54.49 53.47 0.1108 0.2155 0.2716 0.0214 0.0417 0.0522 0.0156 0.0305 0.0382 0.0096 0.0190 0.0240 0.9645 0.9441 0.9357 0.9999 0.9998 0.9997 0.9985 0.9998 0.9945 0.9989 0.9969 0.9958 Proposed nLSB 2-LSB 3-LSB 53.62 49.69 50.69 46.82 49.68 45.83 60.73 56.86 57.86 53.97 56.85 52.98 62.06 58.10 59.09 55.19 58.03 54.13 64.09 60.08 61.17 57.12 60.17 56.09 0.0627 0.0840 0.1228 0.1634 0.1548 0.2055 0.0121 0.0162 0.0236 0.0316 0.0298 0.0396 0.0089 0.0119 0.0174 0.0232 0.0220 0.0294 0.0055 0.0074 0.0108 0.0146 0.0136 0.0185 0.9859 0.9750 0.9791 0.9612 0.9750 0.9560 1 1 0.9999 0.9999 0.9999 0.9999 0.9994 0.9991 0.9999 0.9999 0.9971 0.9962 0.9991 0.9991 0.9976 0.9976 0.9968 0.9968 Proposed Hybrid-1 2-LSB 3-LSB 54.74 50.42 52.21 48.06 51.72 47.62 61.51 57.12 58.74 54.35 58.14 53.78 62.87 58.44 60.04 55.60 59.46 55.01 64.86 60.42 62.12 57.63 61.49 57.05 0.0443 0.0666 0.0807 0.1167 0.0907 0.1298 0.0092 0.0141 0.0175 0.0267 0.0200 0.0305 0.0067 0.0103 0.0129 0.0199 0.0148 0.0228 0.0042 0.0066 0.0080 0.0125 0.0092 0.0143 0.9908 0.9786 0.9844 0.9683 0.9829 0.9662 0.9998 0.9997 0.9996 0.9994 0.9996 0.9993 0.9949 0.9938 0.9996 0.9994 0.9992 0.9885 0.9961 0.9933 0.9937 0.9894 0.9928 0.9885 19 Proposed Hybrid-2 2-LSB 3-LSB 52.79 48.57 50.52 46.49 50.04 46.10 59.37 55.00 56.60 52.26 55.93 51.57 60.74 56.24 57.83 53.45 57.14 52.73 62.77 58.28 59.90 55.46 59.21 54.74 0.0703 0.1030 0.1224 0.1708 0.1379 0.1891 0.0151 0.0230 0.0288 0.0435 0.0336 0.0509 0.0110 0.0171 0.0215 0.0327 0.0252 0.0385 0.0069 0.0107 0.0134 0.0207 0.0157 0.0243 0.9863 0.9708 0.9787 0.9595 0.9771 0.9571 0.9997 0.9995 0.9994 0.9991 0.9993 0.9989 0.9927 0.9904 0.9993 0.9990 0.9870 0.9825 0.9940 0.9869 0.9909 0.9852 0.9898 0.9840 References 1. OECD. Internet access (indicator). Link 2. Luo X., Wang D., Wang P., Liu F.: A review on blind detection for image steganography. Signal Processing. 88(9). 2138-2157. Link 3. Chen K., Lin C., Zhong S., Guo L.: A parallel SRM feature extraction algorithm for steganalysis based on GPU architecture. Computer Science and Information Systems. 12 (4). 1345-1359. Link 4. Karakus S., Avci E.: A new image steganography method with optimum pixel similarity for data hiding in medical images. Medical Hypotheses. 139. Link 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 Kemal Tütüncü, Özcan Çataltaş 5. Tian Q., Han D., Jiang Y.: Hierarchical Authority Based Weighted Attribute Encryption Scheme. Computer Science and Information Systems. 16(3). 797-813. Link 6. Sharafi J., Khedmati Y., Shabani M.M.: Image steganography based on a new hybrid chaos map and discrete transforms. Optik. 226(2). Link 7. Rustad S., Setiadi D., Syukur A., Andono P.: Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University - Computer and Information Sciences. Early Access. Link 8. Roy R., Sarkar A., Changder S.: Chaos based Edge Adaptive Image Steganography. Procedia Technology. 10. 138-146. Link 9. Cataltas O., Tutuncu K.: Improvement Of LSB Based Image Steganography. International Journal Of Electrical, Electronics And Data Communication. 5 (2017) 1-5. Link 10. Rajput V., Tiwari S.K., Gupta R.: An enhanced image security using improved RSA cryptography and spatial orientation tree compression method. 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016. p. 327-31. Link 11. Chen S.K.: A module-based LSB substitution method with lossless secret data compression. Comput Stand Inter. 33 (2011) 367-71. Link 12. Akhtar N., Ahamad V., Javed H.: A compressed LSB steganography method. 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), 2017. p. 1-7. Link 13. Chikouche S.L., Chikouche N.: An improved approach for lsb-based image steganography using AES algorithm. 2017 5th International Conference on Electrical Engineering Boumerdes (ICEE-B), 2017. p. 1-6. Link 14. Manjula Y., Shivakumar K.B.: Enhanced secure image steganography using double encryption algorithms. 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016. p. 705-8. Link 15. Kasapbaşi M.C.: A New Chaotic Image Steganography Technique Based on Huffman Compression of Turkish Texts and Fractal Encryption With Post-Quantum Security. IEEE Access. 7 (2019) 148495-510. Link 16. Rachmawanto E.H., Amin R.S., Setiadi D.I.M., Sari C.A.: A Performance Analysis StegoCrypt Algorithm based on LSB-AES 128 bit in Various Image Size. 2017 International Seminar on Application for Technology of Information and Communication (Isemantic). (2017) 16-21. Link 17. Jain N., Meshram S., Dubey S.: Image Steganography Using LSB and Edge – Detection Technique. International Journal of Soft Computing and Engineering. 2 (2012) 217-22. Link 18. Shanmugasundaram S., Lourdusamy R.: A Comparative Study Of Text Compression Algorithms. International Journal of Wisdom Based Computing. 1 (2011) 68-76. Link 19. Langdon G.G., Rissanen J.: Compression of Black-White Images with Arithmetic Coding. IEEE T Commun. 29 (1981) 858-67. Link 20. Langdon G.G.: An Introduction to Arithmetic Coding. IBM J Res Dev. 28 (1984) 135-49. Link 21. Tahghighi M., Mousavi M., Khadivi P.: Hardware implementation of a novel adaptive version of Deflate compression algorithm. 2010 18th Iranian Conference on Electrical Engineering, 2010. p. 566-9. Link 22. Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signatures ad public-key cryptosystems. Commun ACM. 21 (1977) 1-15. Link 23. Xin Z., Xiaofei T.: Research and implementation of RSA algorithm for encryption and decryption. Proceedings of 2011 6th International Forum on Strategic Technology, 2011. p. 1118 21. Link 25. Rivest R.L.: The RC5 encryption algorithm. in: B. Preneel, (Ed.). Fast Software Encryption. Springer Berlin Heidelberg: Berlin, Heidelberg, 1995. p. 86-96. Link 25. Shahzadi R., Anwar S.M., Qamar F., Ali M., Rodrigues J.J.P.C.: Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring. IEEE Access. 7 (2019) 52858-70. Link Compensation of degradation, security, and capacity of LSB substitution ... 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 26. McLoone M., McCanny J.V.: High-performance FPGA implementation of DES using a novel method for implementing the key schedule. IET Proceedings - Circuits, Devices and Systems. 150 (2003) 373. Link 27. Patidar V., Sud K.K.: A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing. Informatica. 33 (2009) 441-52. Link 28. Kadhim I.J., Premaratne P., Vial P.J., Halloran B.: Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing. 335 (2019) 299-326. Link 29. Zhou W., Bovik A.C.: A universal image quality index. IEEE Signal Proc Let. 9 (2002) 81-4. Link Kemal TÜTÜNCÜ was born in Konya, Turkey, in 1975. He received the master’s degree from Free University of Brussel, Belgium. He received Ph.D. degrees from Selcuk University, Turkey. His research interest includes cryptology, information security, natural language processing, and artificial intelligence. Özcan ÇATALTAŞ was born in Konya, Turkey, in 1992. He received the master’s degree from Selcuk University, Turkey. His research interest includes information security and artificial intelligence.
Keep reading this paper — and 50 million others — with a free Academia account
Used by leading Academics
ramesh kumar ayyasamy
Universiti Tunku Abdul Rahman
John F Dooley
Knox College
Monish Chatterjee
University of Dayton
Adnan Gutub
Umm Al-Qura University, Makkah, Saudi Arabia