LSB Algorithm based on Support Vector Machine in Digital Image Steganography
Keywords:Discrete Consine Transformation, Image Steganography, Support Vector Machine,
AbstractThe importance of information security in protecting data and information has increased due to the increased use of computers and the Internet. It similar with the one of exciting subfields of information security called information hiding. Information hiding is a technology where the secret-messages are hidden inside other files (e.g image files). One of the areas that are popular now applying this technology is digital image steganography (image steganography). In this paper proposed StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance. This can be seen when PSNR record high value, where it displays a good quality cover-image.
T. Moerland. “Leiden Institute of Advanced Computing Science”,.Retrieved January 23, 2009, from Steganography and Steganalysis: http://www.liacs.nl/home/tmoerl/privtech.pdf. 2009.
M. T. Siponen and H. Oinas-Kukkonen, “A Review of Information Security Issues and Respective Research Contributions”. Database for Advances in Information Systems , pp. 60-80. 2007
K. Rabah. “Steganography-The Art of Hiding Data”. Information Technology Journal , pp. 245-269. 2003.
S. Lau, “SANS Security Essentials GSEC”, Retrieved May 13, 2010, from An Analysis of Terrorist Groups’ Potential Use of Electronic Steganography. 2003
A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt. “ Review: Digital Image Steganography: Survey and Analysis of Current Methods”. Journal Signal Processing, pp. 727-752. 2010.
P. M. Santi, M. K. Undu. “Genetic Algorithms for Optimality of Data Hiding in Digital Images”. Bio-Inspired Information Hiding, pp.361-373. 2009.
M. A. Younes and A. Jantan. “ A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion”. International Journal of Computer Science and Network Security , pp. 247-254. 2008.
N. Jiang. “A Novel Analysis Method of Information Hiding”. International Congress on Image and Signal Processing, pp. 621-625. 2009.
L. Bin, H. Junhui, H. Jiwu, and Q. S. Yun. “ A Survey on Image Steganography and Steganalysis”. Journal of Information Hiding and Multimedia Signal Processing , pp. 142-172. 2011.
J. He, S. Tan, & T. Wu. “On the Security of Steganographic Techniques”. International Congress on Image and Signal Processing, pp. 716-719. 2008.
R. Din and A. Shamsudin.” Digital Steganalysis: Computational Intelligence Approach”. International Journal of Computers , pp. 161-16. 2009.
S. Trivedi and R. Chandramouli. “ Active Steganalysis of Sequential Steganography”. SPIE Conference, 2003 pp. 123-130.
C. Cachin. “ An Information-Theoretic Model for Steganography”. Information and Computation ,2004, pp. 41-56.
Y. K. Lee and L. H. Chen. “A Secure Robust Image Steganographic Model”. The Conference on Information Security, 2008, pp. 275-284. Hualien, Taiwan
T. Morkel, J. H. Eloff, J. and M.S. Olivier, M. “An Overview of Image Steganography”. Annual Information Security South Africa Conference. 2005.
Z. Duric, D. Richards, and Y. Kim. “Minimizing the Statistical Impact of LSB Steganography”. International Conference on Image Analysis and Recognition, 2005 pp. 1175–1183). Toronto: Springer
S. Ramly, S.A. Aljunid and H.S. Hussain. “SVM-SS Watermarking Model for Medical Images”.Digital Enterprise and Information Systems, 2011, pp. 372-386.
J. Fridrich. “Featured-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes”. International Workshop on Information Hiding, 2006, pp. 67-81.
R. W. Lucky, “Automatic equalization for digital communication,” Bell Syst. Tech. J., vol. 44, no. 4, pp. 547–588, Apr. 1965.
S. P. Bingulac, “On the compatibility of adaptive controllers (Published Conference Proceedings style),” in Proc. 4th Annu. Allerton Conf. Circuits and Systems Theory, New York, 1994, pp. 8–16.
A. Almohammad, R. M. Hierons, and G. Ghinea. “ High Capacity Steganographic Method Based Upon JPEG”. The Third International Conference on Availability, Reliability and Security , 2008, pp. 544-549.
M. A. Zaher. “Modified Least Significant Bit (MLSB)”. Computer and Information Science , 2011, pp.60-67.
E. Walia, P. Jain, and P. Navdeep. “ An Analysis of LSB and DCT Based Steganography”. Global Journal of Computer Science and Technology , 2010 pp.4-8.
L. Por, W. K Lai, Z. Alireza, T. F. Ang, M. Su, B. Delina. “StegCure: A Comprehensive Steganographic Tool using Enhanced LSB”. WSEAS Transactions of Computers Journal , 2008 pp. 1309-1318.
V. Kecman. Learning and Soft Computing. London: The MIT Press. 2001
L. Li, W.Y. Ding, and J.Y Li. “A Novel Robustness Image Watermarking Scheme Based on Fuzzy Support Vector Machine”. The 3rd IEEE International Conference on Computer Science and Information Technology, 2010, pp. 533 – 537.
F. Meng, H. Peng, Z. Pei, J. Wang, J.” A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain”. International Conference on Computational Intelligence and Security, 2008, pp. 16 - 20.
H. H. Tsai, H.C. Tseng, Y.S. Lai.” Robust Lossless Image Watermarking Based on A-Trimmed Mean Algorithm and Support Vector Machine”. The Journal of Systems and Software, 2008 pp. 1015–1028.
H. Peng, J. Wang, W. Wang. “Image Watermarking Method in Multiwavelet Domain Based on Support Vector Machines”. The Journal of Systems and Software, 2010, pp. 1470–1477.
C. Schneider, W. Rasband, and K. Eliceiri. “ NIH Image to ImageJ: 25 years of image analysis. Nature Methods, 2012, pp. 671–675
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.