{"title":"自适应位旋转和反转评分:一种新的LSB图像隐写方法","authors":"Ryan A. Subong, Arnel C. Fajardo, Yoon-Joong Kim","doi":"10.1109/HNICEM.2018.8666228","DOIUrl":null,"url":null,"abstract":"In image steganography, the direct trade-off between the aspects of image’s imperceptibility and payload capacity has always been a long-time challenge wherein the improvement of one aspect degrades the other. The more secret data is embedded into an image, the more it begins to look different from the original image. The more the image looks altered, the more it will be suspected of hiding something else other than the visible picture that it is displaying. This study proposes a novel image steganographic approach that produces secret-embedded images with payload capacity comparable with other late variations of spatial domain steganography techniques but with a better imperceptibility level. The nature of the approach is similar to classic LSB (Least Significant Bit) substitution steganography techniques wherein the bit information of the secret message is embedded into the image by replacing the LSB value of its pixel, except that this approach had the embedding bits undergo a series of evaluated and scored bit rotation and inversion operations prior bit replacement in its attempt to embed secret bits into an image with minimal pixel distortion as possible. This study however does not explore the security aspect of the generated image against its resistance to geometric and steganalysis attacks.","PeriodicalId":426103,"journal":{"name":"2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Adaptive Bit Rotation and Inversion Scoring: A Novel Approach to LSB Image Steganography\",\"authors\":\"Ryan A. Subong, Arnel C. Fajardo, Yoon-Joong Kim\",\"doi\":\"10.1109/HNICEM.2018.8666228\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In image steganography, the direct trade-off between the aspects of image’s imperceptibility and payload capacity has always been a long-time challenge wherein the improvement of one aspect degrades the other. The more secret data is embedded into an image, the more it begins to look different from the original image. The more the image looks altered, the more it will be suspected of hiding something else other than the visible picture that it is displaying. This study proposes a novel image steganographic approach that produces secret-embedded images with payload capacity comparable with other late variations of spatial domain steganography techniques but with a better imperceptibility level. The nature of the approach is similar to classic LSB (Least Significant Bit) substitution steganography techniques wherein the bit information of the secret message is embedded into the image by replacing the LSB value of its pixel, except that this approach had the embedding bits undergo a series of evaluated and scored bit rotation and inversion operations prior bit replacement in its attempt to embed secret bits into an image with minimal pixel distortion as possible. This study however does not explore the security aspect of the generated image against its resistance to geometric and steganalysis attacks.\",\"PeriodicalId\":426103,\"journal\":{\"name\":\"2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HNICEM.2018.8666228\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HNICEM.2018.8666228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive Bit Rotation and Inversion Scoring: A Novel Approach to LSB Image Steganography
In image steganography, the direct trade-off between the aspects of image’s imperceptibility and payload capacity has always been a long-time challenge wherein the improvement of one aspect degrades the other. The more secret data is embedded into an image, the more it begins to look different from the original image. The more the image looks altered, the more it will be suspected of hiding something else other than the visible picture that it is displaying. This study proposes a novel image steganographic approach that produces secret-embedded images with payload capacity comparable with other late variations of spatial domain steganography techniques but with a better imperceptibility level. The nature of the approach is similar to classic LSB (Least Significant Bit) substitution steganography techniques wherein the bit information of the secret message is embedded into the image by replacing the LSB value of its pixel, except that this approach had the embedding bits undergo a series of evaluated and scored bit rotation and inversion operations prior bit replacement in its attempt to embed secret bits into an image with minimal pixel distortion as possible. This study however does not explore the security aspect of the generated image against its resistance to geometric and steganalysis attacks.