High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms


Creative Commons License

SOLAK S.

IEEE ACCESS, cilt.8, ss.166513-166524, 2020 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 8
  • Basım Tarihi: 2020
  • Doi Numarası: 10.1109/access.2020.3023197
  • Dergi Adı: IEEE ACCESS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Sayfa Sayıları: ss.166513-166524
  • Anahtar Kelimeler: Encryption, Data mining, Image quality, Visualization, Media, Data hiding, data security, exploiting modification direction (EMD), enhanced modified signed digit (EMSD), generalized exploiting modification direction (GEMD), least significant bit (LSB), sparse modified signed digit (SMSD), IMAGE STEGANOGRAPHY, DIRECTIONS, SCHEME, PVD
  • Kocaeli Üniversitesi Adresli: Evet

Özet

Data hiding called steganography is a security technique to protect secret data throughout the transmission from malicious attackers. The purposes of steganography are to obtain good stego-image quality, high embedding-capacity, low computational complexity, visual imperceptibility, undetectability, and more security. In this paper, we offer a new hybrid image steganography technique based on least significant bit (LSB) substitution and enhanced modified signed digit (EMSD) algorithms. The proposed algorithm utilizes n adjacent cover image pixels to hide the secret data with EMSD algorithm, and least significant k-bit for LSB substitution algorithm. Hence, it has more embedding capacity than the EMSD algorithm and exploiting modification direction (EMD) based algorithms. We obtain that the stego-image quality is better than 43 dB when the payload is 2.404 bpp. The results of experiment represent that this algorithm ensures high embedding-capacity while preserving acceptable visual stego image quality that can be undetectable by human eyes. Also, the hybrid of the EMSD and LSB substitution algorithms is to difficult for malicious people to consolidate data by scrambling secret data bits.