5 Conclusions
This paper proposes a new method, SLSB (Selected Least Significant Bit), that
improves the performance of the LSB method hiding information in only one of the
three colors at each pixel of the cover image. For the selection of color it uses a
Sample Pairs analysis, given that this analysis is more effective to detect hidden
information. Finally, applies a LSB Match [8] method so that the final color is as
close as possible to the original one.
A summary of its features could be:
- It is based on the LSB method, but can hide the same information much more
effectively using bits of just one color.
- Implement the LSB Match method to reduce the difference between the original
pixel and the steganographic pixel.
- Perform a Sample Pairs analysis prior to steganography, which allows you to
select the best color of the three possible to hide information.
- Use a pixel selection filter to obtain the best areas to hide information.
- It is immune to visuals attacks. Changes are undetectable with the naked eye, and
a filter of LSB bits doesn’t present areas of random information that could
indicate the presence of hidden information.
- It is immune to statistical attacks, as two colors for each pixel are equal to those of
the original image, and the final ratio of analysis is very close to the original
image, which doesn’t raise suspicion it contains hidden information. Even in some
cases get better rates than those of the original image, creating confusion over
which of two images would be the original.
- It is immune to attacks by comparing histograms, as the frequency of appearance
of colors in the steganographic image is very similar to that of the cover image.
- It yields well above that of most steganographic tools used today, both in RS and
Sample Pairs analysis and in metric of distortion.
Future works will aim to achieve better performance and be undetectable by the most
famous steganographic analysis, for example, changing bits undisturbed by the
concealment of the message.
References
1 Kurak, C. and McHugh, J.: A Cautionary Note on Image Downgrading. Computer Security
Applications Conference. San Antonio, USA (1992)
2 Moskowitz, I., Longdon G. and Chang, L.: A New Paradigm Hidden in Steganography.
Center for High Assurance Computer Systems. Naval Research Laboratory (2000)
3 Sharp, T.: An implementation of key-based digital signal steganography. Proc. of 4th
International Workshop on Information Hiding. Springer-Verlag (2001)
4 Kawaguchi, E. and Eason, R.: Principle and applications of BPCS-Steganography. Kyushu
Institute of Technology. Japan (1998)
5 Bender, W., Gruhl, D., Morimoto, N. and Lu, A.: Techniques for data hiding. IBM Systems
Journal, Vol. 35, Nos. 3&4 (1996)
65