Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/476670
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Rossilawati Sulaiman, Dr. | |
dc.contributor.author | Almayyahi Ali Abdulzahra Gore (P97157) | |
dc.date.accessioned | 2023-10-06T09:23:43Z | - |
dc.date.available | 2023-10-06T09:23:43Z | - |
dc.date.issued | 2021-01-19 | |
dc.identifier.other | ukmvital:124901 | |
dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/476670 | - |
dc.description | Since the number of internet users is increasing and sensitive information is exchanged continuously, the security of information has become a problem. Steganography is one of the ways to exchange secret data securely. However, there are still issues that need to be improved, especially in the security aspect, which is the process of embedding secret data that can be vulnerable to attacks. This research focuses on the development of a secure method for hiding secret messages in an image using the Least Significant Bit (LSB) method. The standard LSB method is the most popular technique used in steganography, as it is more efficient to use. However, the main weakness in this method is that it is extremely simple to recover the secret text message from the image, which is always hidden in the least-significant bit of each pixel in an image. Current researches focus on improving the level of security of the embedding process, which involves introducing complex processes for pixels selection. This research aims to address the security issue by manipulating the pixels’ position. There are four stages in this research, which are Data Preparation stage, Embedding stage, Evaluation stage, and Extraction stage. In the Data Preparation stage, the cover-image is compressed utilize Huffman coding so that more spaces can be provided to embed secret information. In the second stage, pixels are selected for embedding secret data using the XNOR operation and Fibonacci algorithm based on the pixels’ position. As a result of these processes, a stego-image is generated with two secret keys. The stego image is evaluated utilize Peak Signal-to-Noise Ratio to evaluate the difference between the stego and the cover-image. In the last stage, the secret message is extracted from the stego image for the receiver of the stego-image. Promising results have been achieved against standard images with higher Peak Signal-to-Noise Ratio (PSNR) values of 65.9463, 65.8928, 65.9902, 65.1531, 66.6170, 65.9386, 65.8456 and 65.7389 dB and Mean Square Error (MSE) values 0.016536, 0.016741, 0.016370, 0.019850, 0.014170, 0.016565, 0.016924 and 0.017345 for Airplane.bmp, Babbon.bmp, Barbara.bmp, Camera.bmp, Lena.bmp, Peppers.bmp, Tiffany.bmp and Tree.bmp respectively than those of state-of-the-art schemes. The evaluation stage proves increasing level of security, embedding capacity as well as imperceptibility in the stego-image.,Master of Computer Science | |
dc.language.iso | eng | |
dc.publisher | UKM, Bangi | |
dc.relation | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat | |
dc.rights | UKM | |
dc.subject | Universiti Kebangsaan Malaysia -- Dissertations | |
dc.subject | Dissertations, Academic -- Malaysia | |
dc.subject | Security of information | |
dc.subject | Data | |
dc.subject | Steganography | |
dc.title | High security LSB-based RGB image steganography using XNOR operation and fibonacci sequence | |
dc.type | theses | |
dc.format.pages | 90 | |
dc.identifier.barcode | 005837(2021)(PL2) | |
Appears in Collections: | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ukmvital_124901+SOURCE1+SOURCE1.0.PDF Restricted Access | 2.01 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.