Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography

Main Article Content

Allwine Hutabarat
Riza Sawitri

Abstract

Computer networks and the internet are growing rapidly, enabling global communication and exchange of information, including text, images, video and audio. However, this progress has also fueled cybercrime, such as data theft. One solution to protect data is steganography, the art of hiding a message in another medium. With the advancement of digital technology, steganography now utilizes digital image files as hidden message containers. Chaotic LSB (Least Significant Bit) based steganography method is implemented in this steganography application. This technique determines the location of message concealment randomly, increasing the security of sending secret data over the internet without being detected. The LSB method allows hidden messages to be accessed only by those who have a special key. The advantage of this method lies in its ability to keep the message secret from unauthorized parties. Thus, the LSB method becomes an important tool for preventing unauthorized access and ensuring the security of confidential data transmission.

Article Details

How to Cite
Hutabarat, A., & Sawitri, R. (2024). Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography. Jurnal Pepadun, 5(3), 286–298. https://doi.org/10.23960/pepadun.v5i3.246

References

A. AbdelRaouf, “A new data hiding approach for image steganography based on visual color sensitivity,” Multimedia Tools and Applications, pp. 1–25, 2021.

N. Hopper, L. V. Ahn, & J. Langford, “Provably Secure Steganography,” IEEE Transactions on Computers, vol. 58, pp. 662–676, 2002.

S. Sharda & S. Budhiraja, “Image Steganography: A Review,” International Journal for Research in Applied Science and Engineering Technology (IJETAE), 3(1), 707-710, 2023.

A. Anees, A. Siddiqui, J. Ahmed, & I. Hussain, “A technique for digital steganography using chaotic maps,” Nonlinear Dynamics, vol. 75, pp. 807–816, 2014.

G. Gambhir & J. Mandal, “Multicore implementation and performance analysis of a chaos-based LSB steganography technique,” Microsystem Technologies, vol. 27, pp. 4015–4025, 2020.

X. Chai, H. Wu, Z. Gan, Y. Zhang, Y. Chen, & K. Nixon, “An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding,” Optics and Lasers in Engineering, vol. 124, p. 105837, 2020.

A. Mu’azu & K. Kabir, “Hybrid of Least Significant Bits and Most Significant Bits for Improving Security and Quality of Digital Image Steganography,” WSEAS Transactions on Computers, 22, pp. 253-262, 2023.

H. Ogras, “An Efficient Steganography Technique for Images using Chaotic Bitstream,” International Journal of Computer Network and Information Security, 15 (2), 21, 2019.

S. Rahman, J. Uddin, H. Khan, H. Hussain, A. Khan, & M. Zakarya, “A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method,” IEEE Access, vol. 10, pp. 124053–124075, 2022.

A. Cheddad, J. Condell, K. Curran, & P. Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process, vol. 90, pp. 727–752, 2010.

H. Tayyeh & A. Al-Jumaili, “A combination of least significant bit and deflate compression for image steganography,” International Journal of Electrical and Computer Engineering (IJECE), 2022.

Kavia & K. Anushudha, “Image Security using Steganography and Cryptography,” International Journal for Research in Applied Science and Engineering Technology, Vol. 9, VII, pp. 373-378, 2021.

M. Valandar, P. Ayubi, and M. Barani, “A new transform domain steganography based on modified logistic chaotic map for color images,” J. Inf. Secur. Appl., vol. 34, pp. 142–151, 2017.

M. Kahn, Steganography Mailing List. [Online] Available: https://www.jjtc.com/Steganography/steglist.htm, 1995.

D. Ariyus, Multimedia Security, Yogyakarta: Andi, 2009.