Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 16
Page No. 5854 - 5863

Enhancing LSB Algorithm against Brute-Force Attack using ASCII Mapping Technique

Authors : Sinan A. Naji, Hussein L. Hussein, A. Mustafa Ihsan and Jasim H. Lafta

References

AL-Nabhani, Y., H.A. Jalab, A. Wahid and R.M. Noor, 2015. Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci., 27: 393-401.
CrossRef  |  Direct Link  |  

Akhtar, N., S. Khan and P. Johri, 2014. An improved inverted LSB image steganography. Proceedings of the 2014 IEEE International Conference on ISSUES and Challenges in Intelligent Computing techniques (ICICT’14), February 7-8, 2014, IEEE, Ghaziabad, India, ISBN:978-1-4799-2899-6, pp: 749-755.

Alsarayreh, M.A., M.A. Alia and K.A. Maria, 2017. A novel image steganographic system based on exact matching algorithm and key-dependent data technique. J. Theor. Appl. Inf. Technol., 95: 1212-1224.
Direct Link  |  

Bhattacharyya, S., P. Indu and G. Sanyal, 2013. Hiding data in text using Ascii Mapping Technology (AMT). Intl. J. Comput. Appl., 70: 29-37.
CrossRef  |  Direct Link  |  

Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRef  |  Direct Link  |  

Chen, P.Y. and H.J. Lin, 2006. A DWT based approach for image steganography. Int. J. Applied Sci. Eng., 4: 275-290.
Direct Link  |  

Deshmukh, P.U. and T.M. Pattewar, 2014. A novel approach for edge adaptive steganography on LSB insertion technique. Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), February 27-28, 2014, IEEE, Chennai, India, ISBN:978-1-4799-3834-6, pp: 1-5.

Donald, H. and M.P. Baker, 1997. Computer Graphics C Version. Prentice Hall Publishing Company, Upper Saddle River, NJ, USA.

Efford, N., 2000. Digital Image Processing: A Practical Introduction using Java. Addison-Wesley Company, Boston, Massachusetts, USA., ISBN:9780201596236, Pages: 340.

Filler, T., J. Judas and J. Fridrich, 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inform. Forensics Secur., 6: 920-935.
CrossRef  |  

Fridrich, J., M. Goljan and R. Du, 2001. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 8: 22-28.
CrossRef  |  Direct Link  |  

Goyal, M., Y. Lather and V. Lather, 2015. Analytical relation and comparison of PSNR and SSIM on babbon image and human eye perception using matlab. Intl. J. Adv. Res. Eng. Appl. Sci., 4: 108-119.
Direct Link  |  

Holub, V. and J. Fridrich, 2012. Designing steganographic distortion using directional filters. Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), December 2-5, 2012, IEEE, Tenerife, Spain, ISBN:978-1-4673-2285-0, pp: 234-239.

Hussain, M. and M. Hussain, 2013. A survey of image steganography techniques. Int. J. Adv. Sci. Technol., 54: 113-124.
Direct Link  |  

Jain, Y.K. and R.R. Ahirwal, 2010. A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys. Intl. J. Comput. Sci. Secur., 4: 40-49.
Direct Link  |  

Jindal, S. and N. Kaur, 2016. Digital image steganography survey and analysis of current methods. Intl. J. Comput. Sci. Inf. Technol. Secur., 6: 10-13.
Direct Link  |  

Johnson, N.F. and S. Jajodia, 1998. Exploring steganography: Seeing the unseen. Computer, 31: 26-34.
CrossRef  |  

Joshi, K., K. Puniani and R. Yadav, 2016. A review on different image steganography techniques. Digital Image Process., 8: 179-186.
Direct Link  |  

Kaur, B., A. Kaur and J. Singh, 2011. Steganographic approach for hiding image in DCT domain. Intl. J. Adv. Eng. Technol., 1: 72-78.
Direct Link  |  

Khalaf, E.T. and N. Sulaiman, 2011. A robust data hiding technique based on LSB matching. World Acad. Sci. Eng. Technol., 5: 1092-1096.
Direct Link  |  

Khosravi, M., S. Soleymanpour-Moghaddam and M. Mahyabadi, 2012. Improved pair-wise LSB matching steganography with a new evaluating system. Proceedings of the 6th International Symposium on Telecommunications (IST), November 6-8, 2012, IEEE, Tehran, Iran, ISBN:978-1-4673-2072-6, pp: 982-986.

Kim, Y., Z. Duric and D. Richards, 2007. Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Lecture Notes in Computer Science, Camenisch, J. et al. (Eds.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-74123-7, pp: 314-327.

Kukapalli, V.R., B.T. Rao and B.S. Reddy, 2014. Image steganography by enhanced pixel indicator method using Most Significant Bit (MSB) compare. Intl. J. Comput. Trends Technol., 15: 97-101.
CrossRef  |  Direct Link  |  

Kumar, M. and M. Yadav, 2014. Image steganography using frequency domain. Intl. J. Sci. Technol. Res., 3: 226-230.
Direct Link  |  

Lee, Y.K., G. Bell, S.Y. Huang, R.Z. Wang and S.J. Shyu, 2009. An advanced least-significant-bit embedding scheme for steganographic encoding. Adv. Image Video Technol., 5414: 349-360.
CrossRef  |  

Li, B., J. He, J. Huang and Y.Q. Shi, 2011. A survey on image steganography and steganalysis. J. Inform.Hiding Multimedia Signal Process., 2: 142-172.
Direct Link  |  

Luo, W., F. Huang and J. Huang, 2010. Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensics Secur., 5: 201-214.
CrossRef  |  

Luo, W., F. Huang and J. Huang, 2011. A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools Appli., 52: 407-430.
CrossRef  |  

Muhammad, K., J. Ahmad, S. Rho and S.W. Baik, 2017. Image steganography for authenticity of visual contents in social networks. Multimedia Tools Appl., 76: 18985-19004.
CrossRef  |  Direct Link  |  

Muhammad, K., M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, 2016. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Mult. Tools Appl., 75: 14867-14893.
CrossRef  |  Direct Link  |  

Muhammad, K., M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, 2018. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener. Comput. Syst., 86: 951-960.
CrossRef  |  Direct Link  |  

Nag, A., S. Biswas, D. Sarkar and P.P. Sarkar, 2010. A novel technique for image steganography based on block-DCT and huffman encoding. Int. J. Comput. Sci. Inform. Technol., 2: 103-112.
CrossRef  |  Direct Link  |  

Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
CrossRef  |  Direct Link  |  

Radhakrishnan, R., M. Kharrazi and N. Memon, 2005. Data masking: A new approach for steganography?. J. VLSI Signal Process. Syst. Signal Image Video Technol., 41: 293-303.
CrossRef  |  Direct Link  |  

Raja, K.B., C.R. Chowdary, K.R. Venugopal and L.M. Patnaik, 2005. A secure image steganography using LSB, DCT and compression techniques on raw images. Proceedings of 3rd International Conference on Intelligent Sensing and Information Processing, December 14-17, 2005, Bangalore, India, pp: 170-176.

Rani, J. and T.A. Khan, 2014. Performance optimized DCT domain watermarking technique with JPEG. Intl. J. Innovative Technol. Exploring Eng., 4: 20-24.
Direct Link  |  

Senarathne, A.N. and K. De Zoysa, 2014. ILSB: Indexing with least significant bit algorithm for effective data hiding. Intl. J. Comput. Appl., 161: 28-42.
Direct Link  |  

Shen, S.Y. and L.H. Huang, 2015. A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput. Secur., 48: 131-141.
CrossRef  |  Direct Link  |  

Singh, K.U., 2014. A survey on image steganography techniques. Intl. J. Comput. Appl., 97: 10-20.
Direct Link  |  

Swain, G. and S.K. Lenka, 2015. A novel steganography technique by mapping words with LSB array. Intl. J. Signal Imaging Syst. Eng., 8: 115-122.
CrossRef  |  Direct Link  |  

Tuama, A.Y., M.A. Mohamed, A. Muhammed and M.H. Zurina, 2017. Randomized pixel selection for enhancing LSB algorithm security against brute-force attack. J. Math. Stat., 13: 127-138.
CrossRef  |  Direct Link  |  

Viswanatham, V.M. and J. Manikonda, 2010. A novel technique for embedding data in spatial domain. Intl. J. Comput. Sci. Eng., 2: 233-236.
Direct Link  |  

Wang, S., B. Yang and X. Niu, 2010. A secure steganography method based on genetic algorithm. J. Inf. Hiding Multimedia Signal Process., 1: 28-35.
Direct Link  |  

Wang, Y. and P. Moulin, 2006. Statistical modeling and steganalysis of DFT-based image steganography. Proceedings of SPIE International Conference on Security, Steganography and Watermarking of Multimedia Contents VIII Vol. 6072, February 15, 2006, SPIE, San Jose, California, USA., pp: 14-24.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved