Improved LSB Algorithm of Image Hiding Based on Randomness

Article Preview

Abstract:

With the development of image hiding technique, it has become more and more mature. Least significant bit (LSB) image hiding algorithm is the most classic image hiding algorithm, which is simple, efficient and easy-to-extract. However, due to the change of LSB, the statistical characteristic of image carrier changes, which makes the hiding easy to be detected. On the analysis of the deficiency by using the conventional LSB algorithm, the paper propose an improved LSB algorithm of image hiding based on randomness. This algorithm could implement times of randomness on the bytes hiding, volume hiding and bit hiding. In addition, the algorithm could improve the invisibility with a jot modification. Finally, the experiment results indicate that the algorithm could hide the image well and amplify the hiding volume, which could resist the SPA analysis effectively.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

926-930

Citation:

Online since:

February 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D. Kahn: Proc of Information Hiding'96 (Cambridge University Press, UK 1996), pp.183-206.

Google Scholar

[2] F.A. petitcolas, R.J. Anderson, M.G. Kuhn: Proc of the IEEE, Vol. 87 (1999) No. 7, pp.1062-1078.

Google Scholar

[3] Yixian Yang, Xinxi Niu: Journal of communication, Vol. 23 (2002) No. 5, pp.32-38.

Google Scholar

[4] P. Moulin, J.A. O' Sullivan: IEEE Transaction on Information Theory, Vol. 49 (2003) No. 3, pp.563-593.

Google Scholar

[5] Ming Chen: Based on scrambling transformation and improvement of the LSB embedded information camouflage algorithm research (MS, The PLA information engineering university, China 2005), p.2.

Google Scholar

[6] R.Z. Wang, C.F. Liu, J.C. Liu: Pattern Recognition, Vol. 34 (2001) No. 3, pp.671-483.

Google Scholar

[7] Zhanpeng Zhan, Xubang Sheng: Computer application, Vol. 25 (2005) No. 11, p.1.

Google Scholar

[8] Guiyun Li, Guiying Deng, Fengyu Zhao: The computer system application, Vol. 21 (2012) No. 4, pp.1-2.

Google Scholar