In this paper, a new technique for hiding text in a bitmap images will be present. The technique ... more In this paper, a new technique for hiding text in a bitmap images will be present. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves. The technique uses multiple frequency domains for embedding these indexes in an arbitrary chosen bitmap image. By using discrete cosine transform DCT, discrete wavelet transform DWT, and a combination of both of them. ِ A software package for implementing this technique are built and we got very good results in terms of capacity of hiding, imperceptibility which are the most two important properties of steganography, the time of hiding the text, and the security issues.
Unlike other security methods, steganography hides the very existence of secret messages rather t... more Unlike other security methods, steganography hides the very existence of secret messages rather than their content only. Both steganography and steganalysis are strongly related to each other, the new steganographic methods should be evaluated with current steganalysis methods and vice-versa. Since steganography is considered broken when the stego object is recognised, undetectability would be the most important property of any steganographic system. Digital image files are excellent media for steganography, as they have redundancy in their representation. Also, the most widely used method of image steganography is the least significant bit (LSB) embedding. This thesis investigates the latest methods of pixel domain steganography and provides new efficient approaches to improve them in three perspectives: embedding, detection, and the digital forensics investigation process. Firstly, the probability of detection is considered for non-adaptive LSB and 2LSB image steganography even fo...
In this paper, we propose a new method of non-adaptive LSB steganography in still images to impro... more In this paper, we propose a new method of non-adaptive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 random bits per one embedding change even for the embedding rate of 1 bit per pixel. The method takes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pixel values for embedding, it always assumes a single mismatch between the two and uses the second LSB of the first pixel value to hold the index of the mismatch. It is shown that the proposed method outperforms the security of LSB replacement, LSB matching, and LSB matching revisited by reducing the probability of detection with their current targeted steganalysis methods. Other advantages of the proposed method are reducing the overall bit-level changes to the cover image for the same amount of embedded data and avoiding complex calculations. Finally, the new method results in little additional distortion in the stego image, which could be tolerated.
This paper proposes a modification to the Extended Pairs of Values (EPoV) method of 2LSB steganal... more This paper proposes a modification to the Extended Pairs of Values (EPoV) method of 2LSB steganalysis in digital still images. In EPoV, the detection and the estimation of the hidden message length were performed in two separate processes as it considered the automated detection. However, the new proposed method uses the standard deviation of the EPoV to measure the amount of distortion in the stego image made by the embedding process using 2LSB replacement, which is directly proportional with the embedding rate. It is shown that it can accurately estimate the length of the hidden message and outperform the other methods of the targeted 2LSB steganalysis in the literature. The proposed method is also more consistent with the steganalysis methods in the literature by giving the amount of difference to the expected clean image. According to the experimental results, based on analysing 3000 nevercompressed images, the proposed method is more accurate than the current targeted 2LSB steganalysis methods for low embedding rates.
Mobile Multimedia/Image Processing, Security, and Applications 2014, 2014
In this paper we propose an extended pairs of values analysis to detect and estimate the amount o... more In this paper we propose an extended pairs of values analysis to detect and estimate the amount of secret messages embedded with 2-LSB replacement in digital images based on chi-square attack and regularity rate in pixel values, as explained in later sections. The method can accurately detect 2-LSB replacement even when the message length is about 10% of the total capacity. However, the method puts no assumptions neither on the image nor the secret message, as it tested with a random set of 3000 images from ASIRRA pet images and embedded with a random message for each case. This method of detection could also be used as an automated tool to analyse a bulk of images for hidden contents, which could be useful for digital forensics analysts in their investigation process.
IEEE International Symposium on Signal Processing and Information Technology, 2013
This paper proposes a new method of 2LSB embedding steganography in still images. The proposed me... more This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image's pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0.375 bits from the 2LSBs of the cover image, and is much less than the 2LSB replacement which is 0.5 bits. It also reduces the effect of 2LSB embedding pattern of change, which results in lower probability of detection by 44% according to experimental results.
The problem of password management is one of the oldest and most problematic issues in the contex... more The problem of password management is one of the oldest and most problematic issues in the context of computing security and personal digital information. Despite the fact that many researched have been carried out on this problem, most solutions have remained focused on the server side assuming a trusted infrastructure that will enforce a proper management scheme for the user passwords and that exists outside of the user's domain. On the other hand, user or client-side password management has remained at the level of recommendations to users providing some general guidelines to what constitutes good management of a user's set of passwords. In this paper, we propose a novel approach by focusing on the design of a system for the management of a user's passwords that runs within the domain of the user.The new system utilizes information hiding by means of steganography techniques in order to create seamless management of user passwords. To the best of our knowledge this would be the first attempt of using stego-image as a token for two-factor authentication in the literature, which needs no extra cost of hardware, easy to use and implement.
In this paper, a new technique for hiding text in a bitmap images will be present. The technique ... more In this paper, a new technique for hiding text in a bitmap images will be present. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves. The technique uses multiple frequency domains for embedding these indexes in an arbitrary chosen bitmap image. By using discrete cosine transform DCT, discrete wavelet transform DWT, and a combination of both of them. ِ A software package for implementing this technique are built and we got very good results in terms of capacity of hiding, imperceptibility which are the most two important properties of steganography, the time of hiding the text, and the security issues.
Unlike other security methods, steganography hides the very existence of secret messages rather t... more Unlike other security methods, steganography hides the very existence of secret messages rather than their content only. Both steganography and steganalysis are strongly related to each other, the new steganographic methods should be evaluated with current steganalysis methods and vice-versa. Since steganography is considered broken when the stego object is recognised, undetectability would be the most important property of any steganographic system. Digital image files are excellent media for steganography, as they have redundancy in their representation. Also, the most widely used method of image steganography is the least significant bit (LSB) embedding. This thesis investigates the latest methods of pixel domain steganography and provides new efficient approaches to improve them in three perspectives: embedding, detection, and the digital forensics investigation process. Firstly, the probability of detection is considered for non-adaptive LSB and 2LSB image steganography even fo...
In this paper, we propose a new method of non-adaptive LSB steganography in still images to impro... more In this paper, we propose a new method of non-adaptive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 random bits per one embedding change even for the embedding rate of 1 bit per pixel. The method takes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pixel values for embedding, it always assumes a single mismatch between the two and uses the second LSB of the first pixel value to hold the index of the mismatch. It is shown that the proposed method outperforms the security of LSB replacement, LSB matching, and LSB matching revisited by reducing the probability of detection with their current targeted steganalysis methods. Other advantages of the proposed method are reducing the overall bit-level changes to the cover image for the same amount of embedded data and avoiding complex calculations. Finally, the new method results in little additional distortion in the stego image, which could be tolerated.
This paper proposes a modification to the Extended Pairs of Values (EPoV) method of 2LSB steganal... more This paper proposes a modification to the Extended Pairs of Values (EPoV) method of 2LSB steganalysis in digital still images. In EPoV, the detection and the estimation of the hidden message length were performed in two separate processes as it considered the automated detection. However, the new proposed method uses the standard deviation of the EPoV to measure the amount of distortion in the stego image made by the embedding process using 2LSB replacement, which is directly proportional with the embedding rate. It is shown that it can accurately estimate the length of the hidden message and outperform the other methods of the targeted 2LSB steganalysis in the literature. The proposed method is also more consistent with the steganalysis methods in the literature by giving the amount of difference to the expected clean image. According to the experimental results, based on analysing 3000 nevercompressed images, the proposed method is more accurate than the current targeted 2LSB steganalysis methods for low embedding rates.
Mobile Multimedia/Image Processing, Security, and Applications 2014, 2014
In this paper we propose an extended pairs of values analysis to detect and estimate the amount o... more In this paper we propose an extended pairs of values analysis to detect and estimate the amount of secret messages embedded with 2-LSB replacement in digital images based on chi-square attack and regularity rate in pixel values, as explained in later sections. The method can accurately detect 2-LSB replacement even when the message length is about 10% of the total capacity. However, the method puts no assumptions neither on the image nor the secret message, as it tested with a random set of 3000 images from ASIRRA pet images and embedded with a random message for each case. This method of detection could also be used as an automated tool to analyse a bulk of images for hidden contents, which could be useful for digital forensics analysts in their investigation process.
IEEE International Symposium on Signal Processing and Information Technology, 2013
This paper proposes a new method of 2LSB embedding steganography in still images. The proposed me... more This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image's pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0.375 bits from the 2LSBs of the cover image, and is much less than the 2LSB replacement which is 0.5 bits. It also reduces the effect of 2LSB embedding pattern of change, which results in lower probability of detection by 44% according to experimental results.
The problem of password management is one of the oldest and most problematic issues in the contex... more The problem of password management is one of the oldest and most problematic issues in the context of computing security and personal digital information. Despite the fact that many researched have been carried out on this problem, most solutions have remained focused on the server side assuming a trusted infrastructure that will enforce a proper management scheme for the user passwords and that exists outside of the user's domain. On the other hand, user or client-side password management has remained at the level of recommendations to users providing some general guidelines to what constitutes good management of a user's set of passwords. In this paper, we propose a novel approach by focusing on the design of a system for the management of a user's passwords that runs within the domain of the user.The new system utilizes information hiding by means of steganography techniques in order to create seamless management of user passwords. To the best of our knowledge this would be the first attempt of using stego-image as a token for two-factor authentication in the literature, which needs no extra cost of hardware, easy to use and implement.
Uploads
Papers by Omed S Khalind