Keywords : LSB


Hybrid Method between the Discrete Wavelets Translate Technique and the Chaos System Based by the Least Significant Bit Algorithm to Encrypt and Hide a Digital Video File

Hasan Maher Ahmed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2019, Volume 13, Issue 1, Pages 37-52
DOI: 10.33899/csmj.2020.163508

The use of computers today is the most important and widespread means of storing, retrieving and circulating information through local and international networks and smart phones. Thus it is possible to intercept information through different networks or access to computers, whether independent or connected with the network for the purpose of viewing its contents or stealing information or to tamper with, and in this light must ensure the protection, reliability and credibility of information and preservation of the emergence of various means of protection such as the use of encryption and techniques of hiding or coverage of information.
This research is based on a hybrid method between the Discrete Wavelets Translate technique (DWT) and the Chaos system based on the Least Significant Bit algorithm (LSB) to encrypt and hide a digital video file within another digital video that represents the cover by inserting the digital video file and segmenting it into a set of frames and then analyze each frame to its colors (red, green and blue) and then study the color values ​​of each frame and the process of encryption based on the equation of the logistics function (chaotic functions), and the application of the Discrete Wavelets Translate technique on the color slides of the cover frame. The hiding process is done using the Least Significant Bit algorithm based on the logistic function by calculating the series of random locations of cover area.
The results showed that the hybridization of the Discrete Wavelets Translate technique and the chaos system based on the Least Significant Bit algorithm was an effective method for encrypting and hiding digital video files. After applying the work algorithms to a set of samples, the results showed consistency and compatibility in the encrypting and hiding process with the samples that was dealt with.
 

Using the Genetic Algorithm in Developing a Method for Steganography

Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 4, Pages 35-46
DOI: 10.33899/csmj.2013.163555

This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR)  for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). The second include a final for all sections (Blocks) depending on the results of the first stage and the best for a random distribution of sites (Bytes) according to the results of genetic algorithm.
Measuressuch as PSNR, BER, MSE and NC are used to prove the accuracy of the results and efficiency. The application implemented using Matlab 9.
 

GLM for Image Steganography Technique

Ahmed S. Nori; Noor N. Ahmed; Thana Gh. Ahmed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 1, Pages 239-249
DOI: 10.33899/csmj.2013.163455

An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB). This method uses the 5th, and 6th bits of pixel value for insertion and retrieval of message by using the same bits of pixel value.
The idea here, deals with images in different sizes and extensions (BMP, JPG, PNG) for obtaining better results and more  efficient than its original one (LSB). The selection of pixel locations is done by using the pseudo random number generator, Which is uses the same key for insertion as well as retrieval of process.
The experiments show the Superiority of the new idea through using the performance measures (PSNR, BER, NC).
 

Improved LSB Method using Standard Deviation Scale

Nadia M. Mohammed; Riyam J. Essa; Amina M. Najim

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 1, Pages 195-208
DOI: 10.33899/csmj.2013.163452

The concealment of the most important means used by the security institutions with critical communications in all countries of the world, they provided the technology of high security, especially in the communication networks and the Internet. Summarized algorithm concealment improved transfer confidential letter to the formula of (Binary) and then encrypted using a key agreed upon by the two parties (sender and recipient), followed by the division of the image to be hide data where clips blocks size (8*8) and account values ​​standard deviation (Standard Deviation (STD)) for each section are then finding less and the largest value of a standard deviation in addition to the median value, then isolate sections where the value of the standard deviation less Oomsawih of median value to be key concealment (ie be adopted as locations to hide) and that by including all bit of message into the (LSB) for each section of the selected sections. Used measures of efficiency (PSNR), (MSE), (BER) for the purpose of measuring the efficiency of the algorithm and the adoption of improved language (MATLAB).
 

Dual Hiding in Digital Image Files

Farah Tareq Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 1, Pages 131-147
DOI: 10.33899/csmj.2011.163629

The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
In this paper, a modified algorithm is suggested depending on two principles: double information hiding and multiple watermarking. The first principle is represented by cryptography and steganography in a way that each method work separately from the other to ensure a secure content that embedded in the message. While the second principle depends on multiple watermarking represented by images with secret key in a gray image to achieve authentication and accuracy of sending data. Cryptography is used to protect binary image (original watermarking) by using a secret key and embedding more than watermarking (binary and gray images) inside cover file (color image) by using signature (data) that have been taken from the cover file and adopted in the spatial domain for hiding data.
 

An Investigation for Steganography using Different Color System

Amira B. Sallow; Zahraa M. Taha; Ahmed S. Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 91-108
DOI: 10.33899/csmj.2010.163915

Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image.
            The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results.
          

Multistage Hiding Image Techniques

Nadia M. Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 2, Pages 151-166
DOI: 10.33899/csmj.2010.163893

In the few recent years computer sciences have been widely developed especially in communication spaces and Internet, therefore, a great need appear for security and safety of our information. Steganography is the science of hiding information or data (like a secret message) in other cover (like a digital image) in such a way that a normal person can't sense it.
In this paper, four new methods were suggested in steganography systems to embed secret data in compressed images. Two methods are working in spatial domain, known as moving window and odd/even LSB, others are working in transform domain, known as odd/even DCT and DCT+DWT.
The comparison results present that new methods are better than traditional methods in many characteristics, like (efficiency, security level, imperceptibility and robustness). The work was implemented using Matlab.