Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Research Article

Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform

Download
389 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04283-1_26,
        author={Wafaa Abduallah and Abdul Rahma and Al-Sakib Pathan},
        title={Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform},
        proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2014},
        month={6},
        keywords={Data Hiding Mix Column Transform Polynomial Steganography},
        doi={10.1007/978-3-319-04283-1_26}
    }
    
  • Wafaa Abduallah
    Abdul Rahma
    Al-Sakib Pathan
    Year: 2014
    Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-04283-1_26
Wafaa Abduallah1,*, Abdul Rahma2,*, Al-Sakib Pathan1,*
  • 1: International Islamic University Malaysia
  • 2: University of Technology
*Contact email: heevy9@yahoo.com, monem.rahma@yahoo.com, sakib@iium.edu.my

Abstract

Steganography is the science of hiding a message signal in a host signal, without any perceptual distortion of the host signal. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. In this work, we propose a reversible steganography scheme which can hide large amount of information without affecting the imperceptibility aspect of the and at the same time, it increases the security level of the system through using different method for embedding based on distinct type of transform, called Mix Column Transform. Our experimental results prove the ability of our proposed scheme in balancing among the three critical properties: capacity, security, and imperceptibility.