Image steganography method based on complementary image

Authors

  • Євгенія Станіславівна Сулема Національний технічний університет України «Київський політехнічний інститут»
  • Семен Станіславович Широчин Національний технічний університет України «Київський політехнічний інститут»

DOI:

https://doi.org/10.18372/2410-7840.15.5727

Keywords:

steganography, complementary image, Latin squares

Abstract

Abstract. Digital images while either transferring via Internet or storing in common-used servers can easily get into open access. If these images are private, the task of their simple and effective protection becomes topical for a user. Furthermore, time of image processing while protecting is important for an ordinary user. The existing cryptographic methods are not oriented to an ordinary user who needs a simple and fast method for graphical data security while transferring them via network in real time. This paper proposes the steganographic method for digital images protection based on storage of a complementary image instead of the stego-image as well as on using a randomized Latin square as a key. The developed method provides better time performance in encoding and decoding of user data than similar cryptographic methods. It is achieved by using parallel computing. The proposed method can be used in real-time for the protection of private images of a user before their transfer via network. Hidden images can be saved in either png or lossless jpeg formats.

Author Biographies

Євгенія Станіславівна Сулема, Національний технічний університет України «Київський політехнічний інститут»

Ph.D., Assoc. Prof., National Technical University of Ukraine «Kyiv Polytechnic Institute», Assoc. Prof. of Systems Software Department.

Семен Станіславович Широчин, Національний технічний університет України «Київський політехнічний інститут»

National Technical University of Ukraine «Kyiv Polytechnic Institute», Ph.D. student of Systems Software Department.

References

Латинские квадраты [Електронний ресурс] / Режим доступу: http://www.e-olimp.com/en/ problems/2105 - [02.03.2012].

Cummins, J. Steganography And Digital Watermarking / Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett. — School of Computer Science, The University of Birmingham, 2004.

Kharrazi, Mehdi. Image Steganography: Concepts and Practice / Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon. — Polytechnic University of Brooklyn, USA.

Owens, M. A discussion of covert channels and steganography / M. Owens. — SANS Institute, 2002.

Zaidan, B. B. Stego-Image Vs Stego-Analysis System. / B. B Zaidan, A. A Zaidan, Alaa Taqa, Fazida Othman // International Journal of Computer and Electrical Engineering. — Vol. 1, No. 5 December,

Latin squares (2012). Available from: http://www.e- olimp.com/en/problems/2105. [Accessed: 2nd March 2012].

Cummins, J. (2004). Steganography And Digital Watermarking. School of Computer Science, The University of Birmingham.

Kharrazi, Mehdi et al. Image Steganography: Concepts and Practice. Polytechnic University of Brooklyn, USA.

Owens, M. (2002). A discussion of covert channels and steganography. SANS Institute.

Zaidan, B.B. et al (2009). Stego-Image Vs Stego- Analysis System. International Journal of Computer and Electrical Engineering, Vol. 1, No. 5.

Issue

Section

Articles