DOI QR코드

DOI QR Code

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique

XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법

  • Ji, Seon-su (Department of Computer Sciences&Engineering, Gangnung-Wonju National University)
  • Received : 2021.03.31
  • Accepted : 2021.04.16
  • Published : 2021.04.30

Abstract

As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

네트워크 환경에서 다양한 사용자가 증가하면서 송수신되는 민감한 비밀 정보를 공격자로부터 보호하는 것은 어렵다. 이미지에 비트화된 비밀 자료를 LSB 기법으로 은닉하는 것은 공격에 매우 취약할 수 있다. 이를 해결하기 위해 암호화와 정보은닉이 결합하는 하이브리드 방법이 활용된다. 이용자가 비밀 메시지를 안전하게 보호하고, 비밀 통신을 구현하기 위한 효과적인 방법이 요구되고 있다. 즉, 이미지 품질을 보장하기 위해 보안성과 인식 불가능성을 향상시키기 위한 새로운 접근법이 필요하다. 이 논문에서 MSB와 LSB를 기반하여 커버 이미지에 한글 메시지를 은닉하는 LSB 스테가노 그래피 기법을 제안한다. 이때 한글을 초성, 중성, 종성으로 분리한 후, 비밀 자료는 선택된 MSB에 따라 Exclusive-OR 혹은 Exclusive-NOR 연산을 적용한다. 또한 계산된 비밀 자료는 피보나치 기법에 의해 변환된 커버 이미지의 LSB n개 비트에 은닉한다. 적용된 결과의 효율성을 확인하기 위해 PSNR을 이용하였다. 허용되는 결과로서 적합한 41.517(dB)가 확인되었다.

Keywords

References

  1. F. Akhter and M. Selim, "A New Approach of Graph Realization for Data Hiding using Human Encoding", International Journal of Advanced Computer Science and Applications, Vol. 7, No. 12, pp. 436-442, 2016.
  2. A. Rehman, T. Saba, T. Mahmood, Z. Mehmood, M. Shah, and A. Anjum, "Data Hiding Technique in Steganography for Information Security using Number Theory", Journal of Information Science, Vol. 45, No. 6, pp. 767-778, 2019. https://doi.org/10.1177/0165551518816303
  3. M. N. Abdulwahed, "An Effective and Secure Digital image Steganography Scheme using Two Random Function and Chaotic Map", Journal of Theoretical and Applied Information Technology, Vol. 98, No. 1, pp. 78-91, 2020.
  4. A. A. Almayyahi, R. Sulaiman, F. Qamar and A. E. Hamzah, "High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm", International Journal of Advanced Computer Science and Applications, Vol. 11, No. 10, pp. 511-522, 2020.
  5. U. A. Md. Ehasn Ali, Md. Sohrawordi and Md. Palash Uddin, "A Robust and Secured Image Steganography using LSB and Random Bit Substitution", American Journal of Engineering Research, Vol. 8, Issue 2, pp. 39-44, 2020.
  6. K. Joshi, R. Yadav, and G. Chawla, "An Enhanced Method for Data Hiding using 2-bit XOR in Image Steganography", International Journal of Engineering and Technology, Vol. 8, No. 6, pp. 3043-3055, 2017.
  7. R. M. Neamah, J. A. Abed, and E. A. Abbood, "Hide Text Depending on the Three Channels of Pixels in Colour Images using the Modified LSB Algorithm", International Journal of Electrical and Computer Engineering, Vol. 10, No. 1, pp. 809-815, 2020. https://doi.org/10.11591/ijece.v10i1.pp809-815
  8. A. Ahmed and A. Ahmed, "A Secure Image Steganography using LSB and Double XOR Operations", International Journal of Computer Science and Network Security, Vol. 20, No. 5, pp. 139-144, May 2020. https://doi.org/10.22937/IJCSNS.2020.20.05.18
  9. A. Setyono and D. R. I. M. Setiadi, "Securing and Hiding Secret Message in Image using XOR Transposition Encryption and LSB Method", Journal of Physics: Conference Series 1196, pp. 1-6, 2019.
  10. K. Tutuncu and B. Demirci, "Adaptive LSB Steganography Based on Chaos Theory and Random Distortion", Advances in Electrical and Computer Engineering, Vol. 18, No. 3, pp. 15-22, 2018. https://doi.org/10.4316/aece.2018.03003