Logical automatic implementation of steganographic coding algorithms

Authors

DOI:

https://doi.org/10.26577/JMMCS2024121112

Keywords:

Logical automatic implementation, steganographic coding, algorithms, RGB (Red, Green, Blue), LSB (Least Significant Bit), PSNR (peak signal to-noise ratio)

Abstract

The main goal of steganography is to ensure secure communication while keeping the communicative act "invisible". The origin of this term dates back to Ancient Greece and translates as "hidden writing". A simple yet effective method of steganography in antiquity, considering the frequent use of wax tablets, involved cutting out the message on the wooden bottom of the tablet and then writing a decoy message on the wax. Technological evolution has led to human ingenuity, allowing the use of this powerful tool for both message transmission and watermarking products during the transition from physical to digital media. There are various forms of steganography, including injective, generative, substitutive, selective, and constructive. The steganography we employ is injective, as it is more suitable for our task of hiding information in image pixels. After various searches, we decided to use BMP (Bitmap Picture) 3 (Microsoft Windows NT) and later versions as the image file format, as this version, especially in 24-bit and 32-bit encodings, represents a single color component. Each byte allows for altering the least significant bits without changing the external appearance of the image.

References

Kabulov A., Saymanov I., Yarashov I. and Muxammadiev F., "Algorithmic method of security of the Internet

of Things based on steganographic coding2021 IEEE International IOT, Electronics and Mechatronics Conference

(IEMTRONICS), (2021): 1-5, doi: 10.1109/IEMTRONICS52119.2021.9422588

Kabulov A., Normatov I., Urunbaev E., Muhammadiev F., "Invariant Continuation of Discrete Multi-Valued Functions

and Their Implementation2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS),

(2021): 1-6, doi: 10.1109/IEMTRONICS52119.2021.9422486.

Kabulov A., Normatov I., Seytov A., Kudaybergenov A., "Optimal Management of Water Resources in Large Main

Canals with Cascade Pumping Stations2020 IEEE International IOT, Electronics and Mechatronics Conference

(IEMTRONICS), 2020: 1-4, doi: 10.1109/IEMTRONICS51293.2020.9216402.

Kabulov, A. V., Normatov, I. H., "About problems of decoding and searching for the maximum upper zero

of discrete monotone functionsJournal of Physics: Conference Series, 1260(10), 102006, 2019. doi:10.1088/1742

/1260/10/102006.

Kabulov, A. V., Normatov, I. H., Ashurov A.O., "Computational methods of minimization of multiple functions Journal

of Physics: Conference Series, 1260(10), 10200, 2019. doi:10.1088/1742-6596/1260/10/102007.

SaвЂTMed Abed, Al-Mutairi Mohammed, Al-Watyan Abdullah, Al-Mutairi Omar, AlEnizy Wesam, Al-Noori Aisha, "An

Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation"Journal of Circuits,

Systems and Computers, Vol. 28, no. 05, (2019): 1950083.

Abdulrahman Abdullah Alghamdi, "Computerized Steganographic Technique Using Fuzzy Logic"International Journal

of Advanced Computer Science and Applications, Vol. 9, no. 3, (2018): 155-159.

Bruno Carpentieri, Castiglione Arcangelo, De Santis Alfredo, Palmieri Francesco, Pizzolante Raffaele, "Compression-Based

Steganography"Concurrency and Computation: Practice and Experience, Vol. 32, no. 8, (2020).

Mathivanan P., et al., "QR Code Based Color Image Stego-Crypto Technique Using Dynamic Bit Replacement and

Logistic Map"Optik, Vol. 225, (2021): 1-24.

Gurunath R., Alahmadi Ahmed H., Debabrata Samanta, Mohammad Zubair Khan, Abdulrahman Alahmadi, "A Novel

Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks"IEEE Access, Vol. 9 (2021):

–120879.

MegГas David, Wojciech Mazurczyk, Minoru Kuribayashi, "Data Hiding and Its Applications: Digital Watermarking and

Steganography"Applied Sciences, (2021): 1–7.

Kabulov A., Yarashov I., Otakhonov A., "Algorithmic Analysis of the System Based on the Functioning Table and

Information Security 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), (2022):

-5, doi: 10.1109/IEMTRONICS55184.2022.9795746.

Kabulov A., Saymanov I., Yarashov I., Karimov A., "Using Algorithmic Modeling to Control User Access Based on

Functioning Table 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), (2022):

-5, doi: 10.1109/IEMTRONICS55184.2022.9795850.

Navruzov E., Kabulov A., "Detection and analysis types of DDoS attack2022 IEEE International IOT, Electronics and

Mechatronics Conference (IEMTRONICS), (2022): 1-7, doi: 10.1109/IEMTRONICS55184.2022.9795729.

Wenhao Chen, Lin Li, Newman Jennifer, Guan Yong, "Automatic Detection of Android Steganography Apps via Symbolic

Execution and Tree Matching"In 2021 IEEE Conference on Communications and Network Security (CNS), (2021):

–262.

Chiung-Wei Huang, Chou Changmin, Chiu Yu-Che, Chang Cheng-Yuan, et al., "Embedded FPGA Design for Optimal

Pixel Adjustment Process of Image Steganography"Mathematical Problems in Engineering, (2018): 1-8.

Lili Tang, Xie Jialiang, Wu Dongrui, "An Interval Type-2 Fuzzy Edge Detection and Matrix Coding Approach for Color

Image Adaptive Steganography"Multimedia Tools and Applications, Vol. 81, no. 27, (2022): 39145–39167.

Merve Varol Arsoy, "LZW-CIE: A High-Capacity Linguistic Steganography Based on LZW Char Index Encoding"Neural

Computing and Applications, Vol. 34, no. 21, (2022): 19117 19145.

Hala Salih Yusuf, Hani Hagras, "Towards Image Steganography Using Type-2 Fuzzy Logic and Edge DetectionIn 2018

th Computer Science and Electronic Engineering (CEEC), (2018): 75-78.

Mukherjee Nabanita Goutam Paul, Sanjoy Kumar Saha, "An Efficient Multi-Bit Steganography Algorithm in Spatial

Domain with Two-Layer SecurityMultimedia Tools and Applications, Vol. 77, (2018): 18451-18481.

Xiang Lingyun, Rong Wang, Zhongliang Yang, Yuling Liu, "Generative Linguistic Steganography: A Comprehensive

ReviewKSII Transactions on Internet and Information Systems, Vol. 16, no. 3, (2022): 986-1005.

Zhongliang Yang, Zhang Pengyu, Jiang Minyu, Huang Yongfeng, Zhang Yu-Jin, "Rits: Real-Time Interactive Text

Steganography Based on Automatic Dialogue ModelIn International Conference on Cloud Computing and Security,

(2018): 253-264.

Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye, "A Safe and Secured Medical Textual Information Using

an Improved LSB Image SteganographyInternational Journal of Digital Multimedia Broadcasting, (2021): 1-8.

Tibor Gabor Attila, Jozsef Katona, "Development of Multi-Platform Steganographic Software Based on Random

LSBProgramming and Computer Software, Vol. 49, no. 8, (2023): 922-941.

Jayapandiyan Jagan Raj, Kavitha C., Sakthivel K., "Enhanced Least Significant Bit Replacement Algorithm in Spatial

Domain of Steganography Using Character Sequence OptimizationIEEE Access, (2020): 136537-136545.

Sathish Shet K., Aswath A.R., Hanumantharaju M.C., Gao Xiao-Zhi, "Novel High-Speed Reconfigurable FPGA

Architectures for EMD-Based Image SteganographyMultimedia Tools and Applications, Vol. 78, no. 13, (2019): 18309

Iluminada Baturone, Barriga Angel, Jimenez-Fernandez Carlos, Lopez Diego R., Sanchez-Solano Santiago,

"Microelectronic Design of Fuzzy Logic-Based Systems CRC press, (2018): 338.

Safdar Munir M., Bajwa Imran Sarwar, Cheema Sehrish Munawar, "An Intelligent and Secure Smart Watering System

Using Fuzzy Logic and BlockchainComputers and Electrical Engineering, Vol. 77, (2019): 109-119.

Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad Zubair, "Secure Image Steganography using

Cryptography and Image TranspositionarXiv:1510.04413.

Downloads

Published

2024-04-05