Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  JPEG versus GIF Images in forms of LSB Steganography  
  Authors : Eltyeb E. Abed Algabar; Fakhreldeen A. Mohammed
  Cite as: ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-140.pdf

 

Steganography (from Greek steganos, or "covered," and graphie, or "writing") is the hiding of undisclosed message (such as text, image, audio and video) within an ordinary message (such as text, image, audio and video) and the extraction of it at its target (receiver). Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. This paper compares and analyses Least Significant Bit (LSB) algorithm using the cover object as an image with a focus on two types: JPEG and GIF. The comparison and analysis are done with deference number of criteria (Robustness against statistical attacks, Invisibility, Steganalysis detection, Robustness against image manipulation, Efficient when amount of data reasonable, Payload capacity, Unsuspicious files and Amount of embedded data) to understand their strengths and weaknesses.

 

Published In : IJCSN Journal Volume 2, Issue 6

Date of Publication : 01 December 2013

Pages : 86 - 93

Figures : 09

Tables : 04

Publication Link : ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-140.pdf

 

 

 

DR.ELTYEB ELSAMANI ABD ELGABAR ELSAMANI : Assistant Professor(2009) in the Computer Science at Faculty of Computer Science and Information Technology, Information Technology Department - Khulais - King Abdul Aziz University- Jeddah - Saudi Arabia. Assistant Professor in the Computer Science at the Department of Computer Science, Faculty of Computer Science and Information Technology - Alneelain University - Khartoum - Sudan. . Main specialization is Information Security in particular and Encryption in specific. A member of the committee of Standard specifications for Computers Hardware and Peripherals in the National Information Center (NIC) - Khartoum -Sudan , member of Standard specifications for Network Hardware in the National Information Center (NIC) - Khartoum -Sudan, and member of Curriculum of information technology department - Faculty of Kamleen Ahlia- Gazera Sudan.

Dr.Fakhreldeen : is an Assistant Professor in the Computer Science at the Department of Information Technology, Faculty of Computer and Information Technology in khlais, King AbdulAziz University, Saudi Arabia. He is an Assistant Professor in the Computer Science at the Department of Computer Science, Faculty of Computer Science and Information Technology at Alneelain University, Sudan. His main specialization in particular is Performance Evaluation of Computer System. The researches interests include Network Technology & Application, Internet Security and Performance Evaluation of Internet Application. He is a member of the committee of the software standards in the public sector, NIC, Sudan. He is a member of the academic committee, faculty of CSIT, Alneelain University, Sudan.

 

 

 

 

 

 

 

Steganography

Steganographic

Least significant bit (LSB)

Lossless, lossy

 

In the image of kind JPEG we find medium data embedded, high unsuspicious, medium robustness against statistical attacks, high invisibility and low Independent of file format. For the image of kind GIF we find very little data embedded, low unsuspicious, medium invisibility and low robustness against statistical attacks.

 

 

 

 

 

 

 

 

 

[1] Eltyeb E.Abed Elgabar, Haysam A. Ali Alamin, “Comparison of LSB Steganography in GIF and BMP Images ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013.

[2] Eltyeb E.Abed Elgabar “Comparison of LSB Steganography in BMP and JPEG Images ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-5, November 2013.

[3] "Watermarking Application Scenaros and Related Attacks ", IEEE international Conference on Image Processing, Vol. 3, pp. 991 – 993, Oct. 2001.

[4] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf.

[5] Henk C. A. van Tilborg (Ed.), "Encyclopedia of cryptography and security", pp.159. Springer (2005).

[6] Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal,February 1998.

[7] Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf

[8] Pallavi Hemant Dixit, Uttam L. Bombale, " Arm Implementation of LSB Algorithm of Steganography", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-3, February 2013.

[9] “Reference guide:Graphics Technical Options and Decisions”, http://www.devx.com/ /Article/1997.

[10] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001.

[11] NXP & Security Innovation Encryption for ARM MCUs ppt.

[12] Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002.

[13] “MSDN:About Bitmaps” , 2007,M Corporation.

[14] V. Lokeswara Reddy, Dr. A. Subramanyam and Dr.P. Chenna Reddy, " Implementation of LSB Steganography and its Evaluation for Various File Formats", Int. J. Advanced Networking and Applications, Volume: 02, Issue: 05, Pages: 868-872 (2011).

[15] Neeta Deshpande, Snehal Kamalapur and Jacobs Daisy, “Implementation of LSB steganography and Its Evaluation for Various Bits”, 1st International Conference on Digital Information Management, 6 Dec. 2006 pp. 173-178.

[16] J. E. Boggess III, P. B. Nation, M. E. Harmon, “Compression of Colour Information In Digitized Images Using an Artificial Neural Network”, Proceedings of the IEEE 1994 National Aerospace and Electronics Conference, Issue 23-27 May 1994 Page(s):772 - 778 vol.2.

[17] Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 - 391.

[18] Ze-Nian Li and Marks S.Drew, "Fundamentals of Multimedia, School of computing Science Simon Faster University, Pearsoll Education, Inc, 2004.

[19] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, Oct. 2001.

[20] Priya Thomas," Literature Survey On Modern Image Steganographic Techniques", International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 5, May - 2013 ISSN: 2278-0181.

[21] V. Lokeswara Reddy, Dr. A. Subramanyam, Dr.P. Chenna Reddy ,"Implementation of LSB Steganography and its Evaluation for Various File Formats", Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011).

[22] Roshidi Din and Hanizan Shaker Hussain, “The Capability of Image In Hiding A Secret Message”, Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing, September 2006.

[23] D. Llamas, C. Allison, and A. Miller, \Covert channels in internet protocols: A survey," in Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, 2005.

[24] Neil R. Bennett, JPEG STEGANALYSIS & TCP/IP STEGANOGRAPHY, University of Rhode Island , 2009.

[25] H. Wu, N. Wu, C. Tsai, and M. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings-Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611–615, 2005.

[26] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” in Image Processing, 2001. Proceedings. 2001 International Conference on, vol. 3, 2001.

[27] Y. Lee and L. Chen, “High capacity image steganographic model,” IEE Proceedings-Vision, Image and Signal Processing, vol. 147, no. 3, pp. 288–294, 2000.

[28] W. Pennebaker and J. Mitchell, JPEG still image data compression standard. Kluwer Academic Publishers, 1993.

[29] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 Jamil, T.,“Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.

[30] Hamid.A.Jalab, A.A Zaidan, B.B Zaidan, “New Design for Information Hiding with in Steganography Using Distortion Techniques”, International Journal of Engineering and Technology (IJET)), Vol 2, No. 1, ISSN: 1793-8236, Feb (2010), Singapore.