Logical automatic implementation of steganographic coding algorithms
DOI:
https://doi.org/10.26577/JMMCS2024121112Keywords:
Logical automatic implementation, steganographic coding, algorithms, RGB (Red, Green, Blue), LSB (Least Significant Bit), PSNR (peak signal to-noise ratio)Abstract
The main goal of steganography is to ensure secure communication while keeping the communicative act "invisible". The origin of this term dates back to Ancient Greece and translates as "hidden writing". A simple yet effective method of steganography in antiquity, considering the frequent use of wax tablets, involved cutting out the message on the wooden bottom of the tablet and then writing a decoy message on the wax. Technological evolution has led to human ingenuity, allowing the use of this powerful tool for both message transmission and watermarking products during the transition from physical to digital media. There are various forms of steganography, including injective, generative, substitutive, selective, and constructive. The steganography we employ is injective, as it is more suitable for our task of hiding information in image pixels. After various searches, we decided to use BMP (Bitmap Picture) 3 (Microsoft Windows NT) and later versions as the image file format, as this version, especially in 24-bit and 32-bit encodings, represents a single color component. Each byte allows for altering the least significant bits without changing the external appearance of the image.
References
Kabulov A., Saymanov I., Yarashov I. and Muxammadiev F., "Algorithmic method of security of the Internet
of Things based on steganographic coding2021 IEEE International IOT, Electronics and Mechatronics Conference
(IEMTRONICS), (2021): 1-5, doi: 10.1109/IEMTRONICS52119.2021.9422588
Kabulov A., Normatov I., Urunbaev E., Muhammadiev F., "Invariant Continuation of Discrete Multi-Valued Functions
and Their Implementation2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS),
(2021): 1-6, doi: 10.1109/IEMTRONICS52119.2021.9422486.
Kabulov A., Normatov I., Seytov A., Kudaybergenov A., "Optimal Management of Water Resources in Large Main
Canals with Cascade Pumping Stations2020 IEEE International IOT, Electronics and Mechatronics Conference
(IEMTRONICS), 2020: 1-4, doi: 10.1109/IEMTRONICS51293.2020.9216402.
Kabulov, A. V., Normatov, I. H., "About problems of decoding and searching for the maximum upper zero
of discrete monotone functionsJournal of Physics: Conference Series, 1260(10), 102006, 2019. doi:10.1088/1742
/1260/10/102006.
Kabulov, A. V., Normatov, I. H., Ashurov A.O., "Computational methods of minimization of multiple functions Journal
of Physics: Conference Series, 1260(10), 10200, 2019. doi:10.1088/1742-6596/1260/10/102007.
SaвЂTMed Abed, Al-Mutairi Mohammed, Al-Watyan Abdullah, Al-Mutairi Omar, AlEnizy Wesam, Al-Noori Aisha, "An
Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation"Journal of Circuits,
Systems and Computers, Vol. 28, no. 05, (2019): 1950083.
Abdulrahman Abdullah Alghamdi, "Computerized Steganographic Technique Using Fuzzy Logic"International Journal
of Advanced Computer Science and Applications, Vol. 9, no. 3, (2018): 155-159.
Bruno Carpentieri, Castiglione Arcangelo, De Santis Alfredo, Palmieri Francesco, Pizzolante Raffaele, "Compression-Based
Steganography"Concurrency and Computation: Practice and Experience, Vol. 32, no. 8, (2020).
Mathivanan P., et al., "QR Code Based Color Image Stego-Crypto Technique Using Dynamic Bit Replacement and
Logistic Map"Optik, Vol. 225, (2021): 1-24.
Gurunath R., Alahmadi Ahmed H., Debabrata Samanta, Mohammad Zubair Khan, Abdulrahman Alahmadi, "A Novel
Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks"IEEE Access, Vol. 9 (2021):
–120879.
MegГas David, Wojciech Mazurczyk, Minoru Kuribayashi, "Data Hiding and Its Applications: Digital Watermarking and
Steganography"Applied Sciences, (2021): 1–7.
Kabulov A., Yarashov I., Otakhonov A., "Algorithmic Analysis of the System Based on the Functioning Table and
Information Security 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), (2022):
-5, doi: 10.1109/IEMTRONICS55184.2022.9795746.
Kabulov A., Saymanov I., Yarashov I., Karimov A., "Using Algorithmic Modeling to Control User Access Based on
Functioning Table 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), (2022):
-5, doi: 10.1109/IEMTRONICS55184.2022.9795850.
Navruzov E., Kabulov A., "Detection and analysis types of DDoS attack2022 IEEE International IOT, Electronics and
Mechatronics Conference (IEMTRONICS), (2022): 1-7, doi: 10.1109/IEMTRONICS55184.2022.9795729.
Wenhao Chen, Lin Li, Newman Jennifer, Guan Yong, "Automatic Detection of Android Steganography Apps via Symbolic
Execution and Tree Matching"In 2021 IEEE Conference on Communications and Network Security (CNS), (2021):
–262.
Chiung-Wei Huang, Chou Changmin, Chiu Yu-Che, Chang Cheng-Yuan, et al., "Embedded FPGA Design for Optimal
Pixel Adjustment Process of Image Steganography"Mathematical Problems in Engineering, (2018): 1-8.
Lili Tang, Xie Jialiang, Wu Dongrui, "An Interval Type-2 Fuzzy Edge Detection and Matrix Coding Approach for Color
Image Adaptive Steganography"Multimedia Tools and Applications, Vol. 81, no. 27, (2022): 39145–39167.
Merve Varol Arsoy, "LZW-CIE: A High-Capacity Linguistic Steganography Based on LZW Char Index Encoding"Neural
Computing and Applications, Vol. 34, no. 21, (2022): 19117 19145.
Hala Salih Yusuf, Hani Hagras, "Towards Image Steganography Using Type-2 Fuzzy Logic and Edge DetectionIn 2018
th Computer Science and Electronic Engineering (CEEC), (2018): 75-78.
Mukherjee Nabanita Goutam Paul, Sanjoy Kumar Saha, "An Efficient Multi-Bit Steganography Algorithm in Spatial
Domain with Two-Layer SecurityMultimedia Tools and Applications, Vol. 77, (2018): 18451-18481.
Xiang Lingyun, Rong Wang, Zhongliang Yang, Yuling Liu, "Generative Linguistic Steganography: A Comprehensive
ReviewKSII Transactions on Internet and Information Systems, Vol. 16, no. 3, (2022): 986-1005.
Zhongliang Yang, Zhang Pengyu, Jiang Minyu, Huang Yongfeng, Zhang Yu-Jin, "Rits: Real-Time Interactive Text
Steganography Based on Automatic Dialogue ModelIn International Conference on Cloud Computing and Security,
(2018): 253-264.
Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye, "A Safe and Secured Medical Textual Information Using
an Improved LSB Image SteganographyInternational Journal of Digital Multimedia Broadcasting, (2021): 1-8.
Tibor Gabor Attila, Jozsef Katona, "Development of Multi-Platform Steganographic Software Based on Random
LSBProgramming and Computer Software, Vol. 49, no. 8, (2023): 922-941.
Jayapandiyan Jagan Raj, Kavitha C., Sakthivel K., "Enhanced Least Significant Bit Replacement Algorithm in Spatial
Domain of Steganography Using Character Sequence OptimizationIEEE Access, (2020): 136537-136545.
Sathish Shet K., Aswath A.R., Hanumantharaju M.C., Gao Xiao-Zhi, "Novel High-Speed Reconfigurable FPGA
Architectures for EMD-Based Image SteganographyMultimedia Tools and Applications, Vol. 78, no. 13, (2019): 18309
Iluminada Baturone, Barriga Angel, Jimenez-Fernandez Carlos, Lopez Diego R., Sanchez-Solano Santiago,
"Microelectronic Design of Fuzzy Logic-Based Systems CRC press, (2018): 338.
Safdar Munir M., Bajwa Imran Sarwar, Cheema Sehrish Munawar, "An Intelligent and Secure Smart Watering System
Using Fuzzy Logic and BlockchainComputers and Electrical Engineering, Vol. 77, (2019): 109-119.
Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad Zubair, "Secure Image Steganography using
Cryptography and Image TranspositionarXiv:1510.04413.