The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm

 Several  problems  arise  among  the  existing  LSB-based   image  steganographic  schemes  due  to  distortion  in a  stego- image  and  limited  payload  capacity.  Thus,  a  propose d  scheme  has  been  developed  with  the  aims  to  help  i n  improving  the  payload of the secret data at the same time retaini ng the quality of the stego-image produced within a n acceptance threshold.  This  study  has  led  to  the  modification  of  the  curre nt  LSB  substitution  algorithm  by  delivering  a  new  a lgorithm  namely  sequential  colour  cycle.  For  achieving  a  higher  sec urity,  multi-layered  steganography  can  be  performed   by  embedding  a  secret data into multiple layers of cover-images. T he performance evaluation has been tested and prove n that the improvement  of  embedding  ratio  at  1:2  for  the  proposed  algorith m  can  be  achieved  and  the  value  of  the  image  qualit y  is  not  falling  below  the threshold of distortion.   


[1] Al-Ataby A. and Al-Naima F Capacity Image Steganography Technique Based The International Arab Journal of Information Techn ology, Vol. 10, No. 1, January 2013 riginal image and a stego-image using mage. Original Image Stego-Image and Future Work lgorithm using sequential colour cycle is proposed to optimise the current LSB mechanism by utilising and integrating stego one LS B to stego four LSBs and also stego colour cycle LSB. As a result, the proposed scheme is able to encode up e each of the RGB pixels according to the contents of the secret data without visually The proposed scheme contributes a multi-layered embedding feature that enable senders to encode secret data into several cover-images sequentially to create a stealth camouflage to avoid intruder's unwanted attention. Another advantage is the on of bit substitution using sequential lgorithm to ensure the capacity of stego- images remain unchanged despite having multiple layers of encoding and decoding embedded. The proposed scheme also contributes to the flexibility in n of any secret data file types as long as the size of secret data is approximately 50% of the cover- image size. Having reviewed comparison with related work, the contributions mentioned in the proposed scheme is proven to outperform most of the current based tools. In a nutshell, the proposed scheme has achieved its envisioned objectives by developing a novel prototype to increase embedding ratio as well as alleviate problems of images production and restrictions Future work will focus on diversifying the various medium and to increase the capacity of payload using other alternative methods such We strive to explore and discover rs in the selection of cover mediums as well as ways to embed more secret data. Besides, we would also like to focus on the integration of information hiding method and authentication Naima F., A Modified High Capacity Image Steganography Technique Based An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm 59 on Wavelet Transform, The International Arab Journal of Information Technology , vol. 7, no. 1, pp. 358-364, 2010.

[2] Bailey K. and Curran K., An Evaluation of Image Based Steganography Methods Using Visual Inspection and Automated Detection Techniques, Multimedia Tools and Applications , vol. 31, no. 3, pp. 55-88, 2006.

[3] BMP Format, available at: http://atlc.sourceforge. net/bmp.html, last visited 2009.

[4] BMP Windows Header Format, available at: http://www.fastgraph.com/help/bmp_header_for mat.html, last visited 2009.

[5] Chao R., Wu H., Lee C., and Chu Y., A Novel Image Data Hiding Scheme with Diamond Encoding, EURASIP Journal on Information Security , vol. 2009, pp. 1-9, 2009.

[6] Cheddad A., Condell J., Curran K., and Mckevitt P., Biometric Inspired Digital Image Steganography, in Proceedings of 15 th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems , Belfast, pp. 159-168, 2008.

[7] EasyBMP C++ Bitmap Library, available at: http://easybmp.sourceforge.net/steganography.ht ml, last visited 2009.

[8] Graphics File Formats, available at: http://www.digicamsoft.com/bmp/bmp.html, last visited 2009.

[9] JAR File Specification, available at: http:// java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html#I ntro, last visited 2009.

[10] Johnson N. and Jajodia S., Exploring Steganography: Seeing the Unseen, IEEE Computer Society , vol. 31, no. 2, pp. 26-34, 1998.

[11] Katzenbeisser S. and Petitcolas P., Information Techniques for Steganography and Digital Watermarking , Artech House, London, 2000.

[12] Kipper G., Investigator's Guide to Steganography , Auerbach Publications, 2004.

[13] Lee C., Chang C., and Wang K., An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy, Image and Vision Computing , vol. 26, no. 12, pp. 1670-1676, 2008.

[14] Lie W. and Chang L., Data Hiding in Images with Adaptive Numbers of Least Significant Bits Based on the Human Visual System, in Proceedings of IEEE International Conference on Image Processing , Japan, vol. 1, pp. 286-290, 1999.

[15] Magic Number Definition, available at: http:// www.linfo.org/magic_number.html, last visited 2009.

[16] Memon N. and Rodila R., Transcoding GIF Images to JPEG-LS, IEEE Transactions on Consumer Electronics , vol. 43, no. 3, pp. 423- 429, 1997.

[17] Microsoft Windows Bitmap File Format Summary, available at: http://www.fileformat. info/format/bmp/egff.htm, last visited 2009.

[18] Mittal A., Low Power Motion Estimation Architecture for MPEG-4 AVC, Master Thesis, University of Edinburgh, 2006.

[19] Morkel T., Eloff J., and Olivier M., An Overview of Image Steganography, in Proceedings of the 5 th Annual Information Security South Africa Conference , South Africa, pp. 1-11, 2005.

[20] Neeta D. and Snehal K., Implementation of LSB Steganography and Its Evaluation for Various Bits, in Proceedings of 1 st International Conference on Digital Information Management , Bangalore, pp. 173-178, 2006.

[21] Oracle, Sun Developer Network, available at: http://java.sun.com/products/plugin/1.3/activex.fa q.html, last visited 2009.

[22] OS/2 Bitmap, available at: http://netghost. narod.ru/gff/graphics/summary/os2bmp.htm, last visited 2009.

[23] Philip H., Library: Angif

[Internet] 1999, available at: http://angif.slashusr.org, last visit ed 2009.

[24] Ponomarenko N., Lukin V., Egiazarian K., and Astola J., DCT Based High Quality Image Compression, in Proceedings of 14 th Scandinavian Conference on Image Analysis , Finland, pp. 1177-1185, 2005.

[25] Por L., Lai W., Alireza A., Ang T., Su M., and Delina B., StegCure: A Comprehensive Steganographic Tool Using Enhanced LSB Scheme, Journal of WSEAS Transactions on Computers , vol. 7, no. 8, pp. 1309-1318, 2008.

[26] Rahman S. and Syed M., Multimedia Technologies: Concepts, Methodologies, Tools, and Applications Book Description , Information Science Publishing, 2007.

[27] Sandipan D., Ajith A., and Sugata S., An LSB Data Hiding Technique Using Prime Numbers, in Proceedings of the 3 rd International Symposium on Information Assurance and Security , Manchester, pp. 101-106, 2007.

[28] Shajeemohan S., Govindan K., and Vijilin B., A Scheme for Image Classification and Adaptive Mother Wavelet Selection, in Proceedings of International Conference on Advanced Computing and Communications , Surathkal, pp. 308-313, 2006.

[29] Structure of BMP File, available at: http://www.ue.eti.pg.gda.pl/fpgalab/zadania.spart an3/zad_vga_struktura_pliku_bmp_en.html, last visited 2009.

[30] Torres-Maya S., Nakano-Miyatake M., and Perez-meana H., An Image Steganography 60 The International Arab Journal of Information Te chnology, Vol. 10, No. 1, January 2013 Systems Based on BPCS and IWT, in Proceedings of 16th International Conference Electronics Communications and Computers , USA, pp. 51-51, 2006.

[31] Yee P-L., and Kiah M-L-M., Shoulder Surfing Resistance Using Penup Event and Neighbouring Connectivity Manipulation, Malaysian Journal of Computer Science , vol. 23, no. 2, pp. 121-140, 2010.

[32] Por L-Y, 2013, Frequency of Occurrence Analysis Attack and Its Countermeasure, The International Arab Journal of Information Technology , Advance online publication , available at: http://www.ccis2k.org/iajit/ PDF/, vol.10, no.1/4143-7.pdf, vol. 10, no.2, Last Visited 2012.

[33] Por L-Y., Wong K-S., and Chee K-O., UniSpaCh: A Textbased Data Hiding Method Using Unicode Space Characters. Journal of Systems and Software , vol. 85, no. 5, pp. 1075- 1082, 2012. Lip Yee Por is a senior lecturer for the Department of System and Computer Technology in the Faculty of Computer Science and Information Technology at University of Malaya. He received his PhD, BSc and MSc in computer science at University of Malaya, Malaysia. His curr ent research interests include information security, steganography, image processing, graphical authentication, grid computing, and e-learning framework. He is a senior member of IEEE since 2011 . His biography has been included in Marquis Who's Who in the World. Delina Beh received her BSc degree in Information Technology and MSc in Computer Science in 2008 and 2010 at University of Malaya, Malaysia. She is a lecturer in Malaysian Institute of Information Technology, Universiti Kuala Lumpur since 2010. Her research area includes information hiding, cryptography, biometric authentication, mobile security and USB security. Tan Fong Ang obtained his PhD from University of Malaya in 2012. He is currently a senior lecturer in the Department of Computer system and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Malaysia. He is a Member of IEEE. His research area s include Web Services, cloud computing and game education. Sim Ying Ong received her BSc in computer science in software engineering at University of Malaya, Malaysia. She is currently pursuing her PhD at University of Malaya, Malaysia.