International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 11, Issue 8 (August 2024), Pages: 57-65

----------------------------------------------

 Original Research Paper

Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images

 Author(s): 

 Kaznah Alshammari *

 Affiliation(s):

 Department of Information Technology, Faculty of Computing and Information Technology, Northern Border University, Rafha 91911, Saudi Arabia

 Full text

  Full Text - PDF

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0009-0000-0741-1732

 Digital Object Identifier (DOI)

 https://doi.org/10.21833/ijaas.2024.08.007

 Abstract

Steganography was originally developed to hide and transmit sensitive information. One major advancement in this field is the ability to hide data within digital images. Significant progress has been made, demonstrating effective methods for concealing data. Various techniques have been used, including statistical steganography, distortion techniques, and the Discrete Cosine Transform (DCT). However, the Least Significant Bit (LSB) method is particularly important and remains the most widely used. Researchers have developed methods based on these principles, such as pseudorandom permutation. This paper introduces the Most Match Parity Bit Approach (MMPB-A), which is based on the LSB method. MMPB-A strategically identifies the parity bits of selected pixels to embed information in cover images. It uses a six-bit encryption for each symbol, allowing ample space to hide information while preserving similarity and secrecy. Additionally, encoding hidden data indices in a three-bit code enhances data concealment and ensures greater confidentiality.

 © 2024 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords

 Steganography, Least significant bit, Digital image concealment, Most match parity bit approach, Confidentiality

 Article history

 Received 23 March 2024, Received in revised form 22 July 2024, Accepted 26 July 2024

 Funding 

This work is supported by the Deanship of Scientific Research, Northern Border University, Arar, Kingdom of Saudi Arabia, under grant number “NBU-FFR-2024-2467-01.”

 Acknowledgment 

The author extends their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, Kingdom of Saudi Arabia, for funding this research work through project number “NBU-FFR-2024-2467-01.”

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Alshammari K (2024). Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images. International Journal of Advanced and Applied Sciences, 11(8): 57-65

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 Fig. 9 Fig. 10 

 Tables

 Table 1 Table 2 Table 3

----------------------------------------------   

 References (33)

  1. Baluja S (2019). Hiding images within images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42: 1685-1697. https://doi.org/10.1109/TPAMI.2019.2901877   [Google Scholar] PMid:30835212
  2. Bouteghrine B, Tanougast C, and Sadoudi S (2021). Novel image encryption algorithm based on new 3-d chaos map. Multimedia Tools and Applications, 80: 25583-25605. https://doi.org/10.1007/s11042-021-10773-8   [Google Scholar]
  3. Cevik T, Cevik N, Rasheed J, Asuroglu T, Alsubai S, and Turan M (2023). Reversible logic-based hexel value differencing—A spatial domain steganography method for hexagonal image processing. IEEE Access, 11: 118186-118203. https://doi.org/10.1109/ACCESS.2023.3326857   [Google Scholar]
  4. Chu Y, Li M, Coimbra CF, Feng D, and Wang H (2021). Intra-hour irradiance forecasting techniques for solar power integration: A review. IScience, 24: 103136. https://doi.org/10.1016/j.isci.2021.103136   [Google Scholar] PMid:34723160 PMCid:PMC8531863
  5. Colati G and Johnston L (2020). Digital files and carrier media. In: Harvey DR and Mahard MR (Eds.), The preservation management handbook: A 21st century guide for libraries, archives, and museums: 287-306. Rowman and Littlefield Publishers, Lanham, USA.   [Google Scholar]
  6. Din R (2023). Comparison of steganographic techniques of spatial domain and frequency domain in digital images. Borneo International Journal, 6(3): 109-118.   [Google Scholar]
  7. Fu Q, Di X, and Zhang Y (2020). Learning an adaptive model for extreme low‐light raw image processing. IET Image Processing, 14: 3433-3443. https://doi.org/10.1049/iet-ipr.2020.0100   [Google Scholar]
  8. Gubbi T (2018). Patch-based denoising with k-nearest neighbor and SVD for microarray images. In: Silhavy R (Ed.), Software engineering and algorithms in intelligent systems. CSOC2018 2018. Advances in Intelligent Systems and Computing, 1(763): 132-147. Springer, Cham, Switzerland. https://doi.org/10.1007/978-3-319-91186-1_15   [Google Scholar]
  9. Harahap ISA (2021). Least significant bit (LSB) modification analysis with alternate insertion message technique on image media. Journal Basic Science and Technology, 10(3): 78-85. https://doi.org/10.35335/jbst.v10i3.1756   [Google Scholar]
  10. Hashim MM, Rahim MSM, Johi FA, Taha MS, and Hamad HS (2018). Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. International Journal of Engineering and Technology, 7(4): 3505-3514.   [Google Scholar]
  11. Hussain M, Riaz Q, Saleem S, Ghafoor A, and Jung KH (2021). Enhanced adaptive data hiding method using LSB and pixel value differencing. Multimedia Tools and Applications, 80: 20381-20401. https://doi.org/10.1007/s11042-021-10652-2   [Google Scholar]
  12. Jamali H, Castillo LT, Morgan CC, Coult J, Muhammad JL, Osobamiro OO, Parsons EC, and Adamson R (2022). Racial disparity in oxygen saturation measurements by pulse oximetry: Evidence and implications. Annals of the American Thoracic Society, 19(12): 1951-1964. https://doi.org/10.1513/AnnalsATS.202203-270CME   [Google Scholar] PMid:36166259
  13. Jang J, Badloe T, Sim YC, Yang Y, Mun J, Lee T, Cho YH, and Rho J (2020). Full and gradient structural colouration by lattice amplified gallium nitride Mie-resonators. Nanoscale, 12(41): 21392-21400. https://doi.org/10.1039/D0NR05624C   [Google Scholar] PMid:33078822
  14. Jiang S, Yan W, Cui C, Wang W, Yan J, Tang H, and Guo R (2023). Bioinspired thermochromic textile based on robust cellulose aerogel fiber for self-adaptive thermal management and dynamic labels. ACS Applied Materials and Interfaces, 15(40): 47577-47590. https://doi.org/10.1021/acsami.3c11692   [Google Scholar] PMid:37756210
  15. Kondasinghe CM (2021). A system to preserve metadata using steganography. Ph.D. Dissertation, University of Colombo School of Computing, Colombo, Sri Lanka.   [Google Scholar]
  16. Kumar M, Kumar S, and Nagar H (2020). Comparative analysis of different steganography technique for image or data security. International Journal of Advanced Science and Technology (IJAST), 29(4): 11246-11253.   [Google Scholar]
  17. Li X, Wang D, and Saeed T (2022). Multi-scale numerical approach to the polymer filling process in the weld line region. Facta Universitatis, Series: Mechanical Engineering, 20(2): 363-380. https://doi.org/10.22190/FUME220131021L   [Google Scholar]
  18. Malik A, Ali M, Alsubaei FS, Ahmed N, and Kumar H (2023). A color image encryption scheme based on singular values and chaos. CMES-Computer Modeling in Engineering and Sciences, 137(1): 965-999. https://doi.org/10.32604/cmes.2023.022493   [Google Scholar]
  19. Nour B, Mastorakis S, Ullah R, and Stergiou N (2021). Information-centric networking in wireless environments: Security risks and challenges. IEEE Wireless Communications, 28(2): 121-127. https://doi.org/10.1109/MWC.001.2000245   [Google Scholar] PMid:34366719 PMCid:PMC8340877
  20. Pandey D, Wairya S, Al Mahdawi RS, Najim S ADM, Khalaf HA, Al Barzinji SM, and Obaid AJ (2021). Secret data transmission using advanced steganography and image compression. International Journal of Nonlinear Analysis and Applications, 12(Special Issue): 1243-1257.   [Google Scholar]
  21. Rahman S, Uddin J, Zakarya M, Hussain H, Khan AA, Ahmed A, and Haleem M (2023). A comprehensive study of digital image steganographic techniques. IEEE Access, 11: 6770-6791. https://doi.org/10.1109/ACCESS.2023.3237393   [Google Scholar]
  22. Ray A and Roy S (2020). Recent trends in image watermarking techniques for copyright protection: A survey. International Journal of Multimedia Information Retrieval, 9(4): 249-270. https://doi.org/10.1007/s13735-020-00197-9   [Google Scholar]
  23. Subramani B and Veluchamy M (2023). Bilateral tone mapping scheme for color correction and contrast adjustment in nearly invisible medical images. Color Research and Application, 48(6): 748-760. https://doi.org/10.1002/col.22887   [Google Scholar]
  24. Sushil V and Srivastav S (2023). A data safety approach based on image steganography. In the International Conference on IoT, Communication and Automation Technology, IEEE, Gorakhpur, India: 1-6. https://doi.org/10.1109/ICICAT57735.2023.10263742   [Google Scholar]
  25. Taha NA, Al Saffar A, Abdullatif AA, and Abdullatif FA (2021). Image Steganography using dynamic threshold based on discrete cosine transform. Journal of Physics: Conference Series, 1879(2): 022087. https://doi.org/10.1088/1742-6596/1879/2/022087   [Google Scholar]
  26. Taleby Ahvanooey M, Li Q, Hou J, Rajput AR, and Chen Y (2019). Modern text hiding, text steganalysis, and applications: A comparative analysis. Entropy, 21(4): 355. https://doi.org/10.3390/e21040355   [Google Scholar] PMid:33267069 PMCid:PMC7514839
  27. Unkašević T, Banjac Z, and Milosavljević M (2019). A generic model of the pseudo-random generator based on permutations suitable for security solutions in computationally-constrained environments. Sensors, 19(23): 5322. https://doi.org/10.3390/s19235322   [Google Scholar] PMid:31816914 PMCid:PMC6929088
  28. Vaz R, Frasco MF, and Sales MGF (2020). Photonics in nature and bioinspired designs: Sustainable approaches for a colourful world. Nanoscale Advances, 2(11): 5106-5129. https://doi.org/10.1039/D0NA00445F   [Google Scholar] PMid:36132040 PMCid:PMC9416915
  29. Wang X, Liu C, and Jiang D (2022). An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing. Information Sciences, 610: 300-325. https://doi.org/10.1016/j.ins.2022.08.002   [Google Scholar]
  30. Win NN, Kyaw K, Win T, and Aung P (2019). Image noise reduction using linear and nonlinear filtering techniques. International Journal of Scientific and Research Publications, 9(8): 816-821. https://doi.org/10.29322/IJSRP.9.08.2019.p92113   [Google Scholar]
  31. Xiong Q, Zhang X, Liu W, Ye S, Du Z, Liu D, Zhu D, Liu Z, and Yao X (2020). An efficient row key encoding method with ASCII code for storing geospatial big data in HBase. ISPRS International Journal of Geo-Information, 9(11): 625. https://doi.org/10.3390/ijgi9110625   [Google Scholar]
  32. Yin H, Gong Y, and Qiu G (2020). Fast and efficient implementation of image filtering using a side window convolutional neural network. Signal Processing, 176: 107717. https://doi.org/10.1016/j.sigpro.2020.107717   [Google Scholar]
  33. Zhang YJ and Zhang YJ (2021). Image storage and communication. In: Zhang YJ (Ed.), Handbook of image engineering: 269-276. Springer, Singapore, Singapore. https://doi.org/10.1007/978-981-15-5873-3_7   [Google Scholar]