The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image

Soo Ann Nie, Ghazali Sulong, Rozniza Ali*, Andrew Abel

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

19 Citations (Scopus)

Abstract

Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.

Original languageEnglish
Pages (from-to)5218-5226
Number of pages9
JournalInternational Journal of Electrical and Computer Engineering
Volume9
Issue number6
DOIs
Publication statusPublished - 2019

Keywords

  • Chi square
  • Cover image
  • Knight tour
  • Least significant bit
  • Steganography

Fingerprint

Dive into the research topics of 'The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image'. Together they form a unique fingerprint.

Cite this