High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method

No Thumbnail Available
Hameed R.S.
Mokri S.S.
Taha M.S.
Taher M.M.
Journal Title
Journal ISSN
Volume Title
Science and Information Organization
Research Projects
Organizational Units
Journal Issue
Data security is becoming an important issue because of the vast use of the Internet and data transfer from one place to another. Security of these data is essential, especially when these data represent critical information. There are several techniques used to hide these data, such as encryption. Steganography can be utilised as an alternative to encryption because encryption is susceptible to data modification during transmission. Steganography is the hiding data on a cover multimedia such as images, audio, and video. The technique allows security for data transmission so unwanted third parties cannot notice the hidden data. The challenge of steganography is the trade-off between the hidden data's payload capacity and the system's imperceptibility and robustness. If the hidden data increases, the imperceptibility and the robustness will be decreased. This case is a big challenge in this digital world where social media, Internet, and data transfer are used hugely. Because of this, this paper proposes using a modified Least Significant Bit (LSB) method for the embedding process called Multi-Layer Least Significant Bit Exchange Method (MLLSBEM). This proposed algorithm uses the AES encryption method to encrypt the secret text and then uses Huffman coding to compress the encrypted message as pre-processing data. The proposed study seeks to strike a compromise between important issues, provide maximum payload capacity, and retain high security, imperceptibility, and reliability for secret communication Using image processing and steganography techniques. Simulation findings demonstrate that the suggested method is superior for existing PSNR, SSIM, NCC, and payload capacity investigations. The proposed method is immune to the histogram, chi-square, and HVS attacks. � 2022, International Journal of Advanced Computer Science and Applications. All rights reserved.
Data transfer; Economic and social effects; Image processing; Steganography; High capacity; High capacity component; High-capacity; High-capacity images; Image steganography; Information hiding; Least significant bits; Multi-layer security; Multi-layers; Pay load capacity; Cryptography