A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques

I. Q. Abduljaleel, Z. Abduljabbar, M. A. A. Sibahee, M. J. J. Ghrabat, Junchao Ma, V. O. Nyangaresi
{"title":"A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques","authors":"I. Q. Abduljaleel, Z. Abduljabbar, M. A. A. Sibahee, M. J. J. Ghrabat, Junchao Ma, V. O. Nyangaresi","doi":"10.3390/jsan11040066","DOIUrl":null,"url":null,"abstract":"Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary representation, to achieve different lengths of string, be conducted before text file data masking based on the lightweight Lucas series and mod function to ensure the retrieval of text messages is impossible. The steganography algorithm starts by generating a random key stream using a hybrid of two low-complexity chaotic maps, the Tent map and the Ikeda map. By finding a position vector parallel to the input image vector, these keys are used based on the previously generated position vector to randomly select input image data and create four vectors that can be later used as input for the Lah transform. In this paper, we present an approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images. It is necessary to perform inverse Lah transformation to recover the image pixels and ensure that invisible data cannot be retrieved in a particular sequence. Evaluation of the quality of the resulting stego-images and comparison with other ways of performing encryption and message concealment shows that the stego-image has a higher PSNR, a lower MSE, and an SSIM value close to one, illustrating the suitability of the proposed method. It is also considered lightweight in terms of having lower computational overhead.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Sens. Actuator Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/jsan11040066","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary representation, to achieve different lengths of string, be conducted before text file data masking based on the lightweight Lucas series and mod function to ensure the retrieval of text messages is impossible. The steganography algorithm starts by generating a random key stream using a hybrid of two low-complexity chaotic maps, the Tent map and the Ikeda map. By finding a position vector parallel to the input image vector, these keys are used based on the previously generated position vector to randomly select input image data and create four vectors that can be later used as input for the Lah transform. In this paper, we present an approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images. It is necessary to perform inverse Lah transformation to recover the image pixels and ensure that invisible data cannot be retrieved in a particular sequence. Evaluation of the quality of the resulting stego-images and comparison with other ways of performing encryption and message concealment shows that the stego-image has a higher PSNR, a lower MSE, and an SSIM value close to one, illustrating the suitability of the proposed method. It is also considered lightweight in terms of having lower computational overhead.
一种基于LSB、Lah变换和混沌技术的彩色图像文本隐藏轻量级混合方案
数据安全包括在其他媒体中嵌入隐藏的图像、文本、音频或视频文件,以防止黑客窃取加密数据。然而,现有机制存在安全漏洞的高风险或巨大的计算成本。本文提出的方法结合了低复杂度的加密和隐写机制,以提高传输过程中的安全性,同时降低计算复杂度。在消息加密中,建议采用二进制表示的文本文件数据切片,以实现不同长度的字符串,在文本文件数据屏蔽之前,基于轻量级Lucas系列和mod函数进行数据屏蔽,以确保文本消息无法被检索。隐写算法首先使用两种低复杂度混沌图(Tent图和Ikeda图)的混合生成随机密钥流。通过找到与输入图像向量平行的位置向量,这些键基于先前生成的位置向量来随机选择输入图像数据,并创建四个向量,这些向量可以稍后用作Lah变换的输入。在本文中,我们提出了一种使用LSB彩色图像隐写术隐藏加密文本文件的方法,该方法通过对24位彩色封面图像中的最高有效位应用低复杂度的异或操作。为了恢复图像像素,并保证不可见的数据不能按照特定的顺序被检索到,必须进行逆Lah变换。对生成的隐写图像的质量进行评估,并与其他执行加密和消息隐藏的方法进行比较,结果表明,隐写图像具有较高的PSNR,较低的MSE, SSIM值接近1,说明了所提出方法的适用性。它还被认为是轻量级的,因为它具有较低的计算开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信