Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Double Hiding Information in Color Image File Based on Classical LSB Method

1, 2Aymen Mudheher Badr, 1Xiao Di and 3Husham T. Ibrahim
1College of Computer Science and Technology, Chongqing University, China
2Faculty of Engineering, Diyala University, Diyala, Iraq
3Faculty of Engineering, Basra University, Basra, Iraq
Research Journal of Applied Sciences, Engineering and Technology  2014  3:387-393
http://dx.doi.org/10.19026/rjaset.8.984  |  © The Author(s) 2014
Received: March ‎19, ‎2014  |  Accepted: April ‎15, ‎2014  |  Published: July 15, 2014

Abstract

This study presents a two principles, Cryptography and Steganography, each tow methods work separately from the other to ensure a secure content. We are developed an algorithm to increase the safety and reliability of the copyrights of the images or books (etc.) that published on the internet by providing a watermark image (as logo) hiding inside the original file that we want product it. Firstly reading image (the logo image), convert it to binary and encrypted it by using EX-OR with a secret key and embedding it inside a gray image in the LSB (in the 1st) and hiding first key in the 2nd bit and the second key in the 3rd bit, then we embedding them in the LSB of Original image in RGB to be protected. The two secret keys, first one as an encryption key and the second key using as signature (data) that have been taken from the cover image (original) to make sure the reliability of the image transmitted via the Internet.

Keywords:

Cryptography, EX-OR, gray code , LSB , steganography , watermark,


References

  1. Ali, A.N., 2010. An image steganography method with high hiding capacity based on RGB image. Int. J. Signal Image Process., 1(4): 238.
  2. Hartung, F. and M. Kutter, 1999. Multimedia watermarking techniques. Proc. IEEE, 87(7): 1079-1107.
    CrossRef    
  3. Huajian, L., 2008. Digital Watermarking for Image Content. Geboren, Shandong, China, pp: 47.
  4. Lokeswara Reedy, V., A. Subramanyam and P. Chenna Reddy, 2011. Implementation of LSB steganography and its evaluation for various file formats. Int. J. Adv. Netw. Appl., 2(5): 868-872.
  5. Mamta, J., S.P. Sandhu and W. Ekta, 2009. Application of LSB based steganographic technique for 8-bit color images. Proceedings of World Academy of Science: Engineering and Technology, 50: 427.
  6. Ronald, E.B., 2006. Securing transaction image files using digital watermarking. M.A. Thesis, Department of Science in Information Systems, Athabasca, Alberta.
  7. Saurabh, S. and A. Gaurav, 2010. Use of image to secure text message with the help of LSB replacement. Int. J. Appl. Eng. Res., 1(1): 201.
  8. Teruya, M. and A. Kentaro, 2010. A blind digital image watermarking method using interval wavelet decomposition. Int. J. Signal Process. Image Process. Pattern Recogn., 3(2).

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved