International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 A Spatial Domain Image Steganography Technique Based on Pseudorandom Permutation Substitution Method using Tree and Linked List Bassam Hasan Saghir #1, Elsamani A. Elmutalib Ahmed *2, Gafar Zen A. Salh #2, Abdelmajid H. Mansour *4 Lecturer, Computer Science, Alneelain University, Khartoum, Sudan 1 Professor, Computer Science, Alneelain University, Khartoum, Sudan 2 Assistant professor, Information Technology, University of Jeddah, Jeddah, Saudi Arabia 3,4 Abstract— Steganography is the one of an important methods used in information hiding for numerous application. And they gained a wide range demand of an internet implementations for the security purpose. This paper proposes a method for hiding information using least significant bit „LSB‟ and PESUDE RANDOMIZE method, by emulating the work of trees and linked list, on the BMP, PNG, JPEG image formats. The proposed method performed through two phases, including encrypting end encoding in the first phase, and hiding by 3 secret key on second phase. In order to increase complexity of the hiding process. Keywords— Cover Image, Stego Image, PSNR, MSE, SSIM, “TLLLSB: Tree Linked List Least Significant Bit”, spatial domain, frequency domain, security. INTRODUCTION The word steganography comes from the Greek Steganos, which means covered or secret and graphy means writing or drawing. Therefore, steganography means, literally, covered writing. Steganography is the art and science of hiding secret information in a cover file such that only sender and receiver can detect the existence of the secret information. A secret information is encoded in a manner such that the very existence of the information is concealed. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not only prevents others from knowing the hidden information, but it also prevents others from thinking that the information even exists. If a steganography method causes someone to suspect there is a secret information in a carrier medium, then the method has failed [1]. There are basically three Steganography types. D: C→M of the extraction function with the property that D (E(c,m))=m for all m ЄM and c ЄC Fig. 1 Pure Steganography In most applications, pure Steganography is preferred, since no stego-key must be shared between the communication partners, although a pure Steganography protocols do not provide any security if an attacker knows the embedding method. B. Secret Key Steganography A secret key Steganography system is similar to a symmetric cipher, where the sender chooses a cover and embeds the secret message into the cover using a secret key. If the secret key used in the embedding process is known to the receiver, he can reverse the process and extract the secret message. No one who does not know the secret key should be able to obtain evidence of the encoded information. The secret key Steganography can be defined as the quintuple (C, M, K, DK, EK) where [2]: C: the set of possible covers. M: the set of secret message. K: the set of secret keys. EK: C×M×K→C With the property that DK (EK(c,m,k),k)=m for all m Є M, c ЄC and k ЄK A. Pure Steganography: Pure Steganography is a Steganography system that does not require prior exchange of some secret information before sending message; therefore, no information is required to start the communication process: the security of the system thus depends entirely on its secrecy. The pure Steganography can be defined as the quadruple (C, M, D, and E) where [2]: C: the set of possible covers. M: the set of secret massage with |C| ≥|M|. E: C×M→C the embedding function. ISSN: 2231-5381 http://www.ijettjournal.org Fig. 2 secret key Steganography Page 209 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 C. Public key Steganography: As in public key cryptography, public key steganography does not rely on the exchange of a secret key. Public key steganography systems require the use of two keys, one private and one public key; the public key is stored in a public database. Whereas the public key is used in the embedding process, the secret key is used to reconstruct the secret message. [3] One way to build a public key Steganography system is to use a public key crypto system. The sender and the receiver can exchange public keys of some public key cryptography algorithm before imprisonment. Public key Steganography utilizes the fact that the decoding function in a Steganography system can be applied to any cover, whether or not it already contains a secret message. The receiver who cannot decide a priori if secret information is transmitted in a specific cover will suspect the arrival of message and will simply try to extract and decrypt it using his private key [2]. LEAST SIGNIFICANT BIT (LSB) CODING A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps. In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is, determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the convention in positional notation of writing less significant digit further to the right. It is analogous to the least significant digit of a decimal integer, which is the digit in the ones (right-most) position [1]. LSB coding is the simplest way to embed information in a digital audio file by substituting the least significant bit of each sampling points with a binary message. In referencing specific bits within a binary number, it is common to assign each bit a bit number, ranging from zero upwards to one less than the number of bits in the number. The least significant bits have the useful property of changing rapidly if the number changes even slightly. For example, if 1 (binary 00000001) is added to 3 (binary 00000011), the result will be 4 (binary 00000100) and three of the least significant bits will change (011 to 100). By contrast, the three most significant bits stay unchanged (000 to 000). Least significant bits are frequently employed in pseudorandom number generators checksums [5]. RELATED WORKS Steganography is the art and science of hiding information in a cover data in such a way of invisible communication, that non-participating persons are not capable to detect the presence of this information by analyzing the information detection. There are several research works on the field of Steganography. Jayaram P, Ranganatha H R, Anupama H S were mainly discussed different types of audio steganographic methods, advantages and disadvantages [1]. Zaidoon Kh, ALAni, A.A.Zaidan, B.BZaidan and Hamdan.O.Alanazi, were provided a general overview of the following subject areas: Steganography types, General Steganography system, Characterization of Steganography Systems and Classification of Steganography Techniques [2]. The presenting of some ISSN: 2231-5381 recent development in the field of image to image steganography the particular field is selected because of its large data hiding capability and difficulties in identification. It also provides greater scope because of its large sharing over social networks, had been proposed by Anjali Tiwari, Seema Rani Yadav, N.K. Mittal [4]. The conclusion with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless briefly discussed by Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt [6]. C.P.Sumathi, T.Santanam and G.Umamaheswari were analyzed the various techniques used in steganography and to identify areas in which this technique can be applied, so that the human race can be benefited at large [7]. The given of an overview of image steganography, its uses and techniques, and identifying the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications, were proposed by T. Morkel , J.H.P. Eloff , M.S. Olivier [8]. The new algorithm that was designed in order to hide data inside image using steganography technique. And applying the proposed algorithm, a steganography imaging system (SIS). The receiver can use the same system as well to retrieve back the data that has been hidden inside the image. However, a secret key is needed by the receiver in order to retrieve back the data. This secret key is generated using the proposed algorithm during the process of hiding the data. It maintains privacy, confidentiality and accuracy of the data, were developed by Rosziati Ibrahim and Teoh Suk Kuan [9]. The use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks were presented by Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Dheiaa Najim, Lubna Kanaan [10]. PROPOSED SCHEME: This paper build a method for hiding information using least significant bit and PESUDE RANDOMIZE method, by simulating the work of trees and linked list, on the BMP, PNG, JPEG image formats. The method performed through two phases, in the first phase encoding the secret text message in order to minimizing the size of the text message by rate 0.25%, using the proposed algorithm of reducing the text size before the hiding process by specific encoding, and then encrypting the message. On second phase performing the hiding using 3 secret key to complexity the hiding process. The hiding process depend on encoding and encrypting the data, then randomly hiding the information based on the work of trees and linked list, which is called ―TLLLSB: Tree Linked List Least Significant Bit‖. In the encoding process the entered in English language and transformed to small letters if it contain capital letters. In the step of minimizing the size of the secret message, the letter is converted from 8 bit digit to corresponding 6 bit digit, therefore it can reduce the size of the secret message by approximately 0.25% of the total size. http://www.ijettjournal.org Page 210 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 A. Steps of encoding and encrypting the secret message 1- Entering the secret text message. 2- Convert the text message to 6 bit digits. 3- If this binaries are divisible by 8, then will be transformed to different text, otherwise add the white distance with corresponding encoding to become a series of binaries that are divisible by eight. 4- Group the encoded binaries of 6 bit to replace the normal 8 bit, to become ready for hiding in image. B. Steps of decoding the Secret Message 1- Transforming all 6 bit with the correspondence encoding to the clear letter of the original text. 2- Grouping the letters to make the secret message. C. Data Hiding The process of hiding the data depend on the method of Pseudo random pixel that based on least significant bit (LSB) The selecting of the random pixel by simulating of trees and linked list, as in the following steps: 1- Convert the image of bmp, jpeg or png format to vector- matrix of byte type. 2- Chosen the root of the tree R, consider it is the first key in the hiding process, let it be for example the byte from the image Matrix R = 500000. 3- Selected two keys for hiding, considered the second key P1, and the third key P2, which the key P1 is ahead of R directed towards the end of the matrix of the image and the key P2 directed toward the beginning of the picture. In other words, P1 represents a displacement or the pointer between the elements and the linked list node to the right hand of Enter secret message Save byte array as stego image Encoding message to 6 bit Hide encoding message bits at right and left of root bit by bit in Linked List 1, 2 of branch of tree the tree root. And P2 represents a displacement between the pointer and the elements or the next the linked list node. 4- Test if the number of the secret message binaries less than the available node in the linked lists or equal to it. Otherwise, the amount of displacement is reduced or the value of the node between the elements of the linked list. In order to hide the secret message. 5- The elements of the two linked list, which representing tree branch, are the places of storing secret message. So either storing the half of the secret message in the first linked list, and the other half in the second linked list. And in more complicated hiding manner the bit of the secret message is hidden in the first linked list, and the next bit hidden on the second linked. The next bit on the first linked list and the next bit in the second linked list, and so on the hiding of the secret message binaries completed, after reducing the message size by the previous encoding and encryption algorithm, or without previous encoding algorithm. Here is the process of hiding will be done in two different directions of the image, on the right and left side of the tree root R by opposite directions, which makes the process of hiding more complex and resistant to detect. 6- Saving the byte matrix into image, as shown in Fig. 3. Select Bmp, Png or Jpeg cover image and convert to byte array Enter three keys (root(R), space within nodes of LL shift (p1), space within nodes of LL shift (p2)) Fig. 3 Steps of Proposed Steganography algorithm D. Steps of extracting the Secret Message from the stego 1- Identify the stego and convert it to byte matrix. 2- Identify the tree root R. 3- Identify the second key P1 that represents the shift between linked list elements of first branch of the tree. 4- Identify the third key P2 that represents the shift between linked list elements of the other branch of the tree. 5- Extracting the secret message binaries from the linked list elements of the least significant bit from ISSN: 2231-5381 every element of the two linked list elements, and grouping it text series of 0 and 1. 6- Convert any 6 bit to the correspondence letters in the encoding and encrypting algorithm, shown in Fig. 4. http://www.ijettjournal.org Page 211 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 Enter three keys (root(R), space within nodes of LL shift (p1), space within nodes of LL shift (p2)) Select Stego image Display secret message Extract LSB from selected position by keys Decoding message from 6 bit coding Fig 4. Steps of extracting secret message from the stego image EVALUATION AND DISCUSSION The algorithm was applied on bmp, png and jpeg image formats, and it was hidden texts of size 9.10 KB and 18.2 kb based on the idea of trees and linked lists by opposite directions in the image. Where the evaluation was performed on 5 image of each format. The following tables show the evaluation and the discussion of the hiding algorithm using PSNR, MSE and SSIM criteria. TABLE 1: COVER IMAGES OF BMP FORMAT airplane baboon Barbara E. Hiding text message of size 9.10 kb, BMP format. The tables 2 and 3 shows the results of hiding text file with size 9.10 kb and BMP formats with and without reducing the colorbaots Lena Pepper text size using the proposed Tree Linked List LSB hiding algorithm. TABLE 2: HIDING RESULT OF TEXT FILE OF SIZE 9.10 KB AND BMP FORMAT WITHOUT REDUCING THE SIZE Image Original Image Size Airplane Baboon Barbara Boatscolor Lena Pepper 768kb, 512*512 703kb, 500*480 1.18mb, 720*576 1.29mb, 787*576 768kb, 512*512 768kb , 512*512 Secret Message Size 9.10kb 9.10kb 9.10kb 9.10kb 9.10kb 9.10kb Stego Image Size 565kb 278kb 1.04mb 1.00mb 279kb 715kb PSNR MSE 59.8547 59.7898 61.9136 62.3592 59.9688 60.0248 0.0672 0.0683 0.0419 0.0378 0.0655 0.0647 SSIM TABLE 3: HIDING RESULT OF TEXT FILE OF SIZE 9.10 KB AND BMP FORMAT WITH REDUCING SIZE. Image Original Image Size Airplane Baboon Barbara Boatscolor Lena Pepper 768kb, 512*512 703kb, 500*480 1.18mb, 720*576 1.29mb, 787*576 768kb, 512*512 768kb, 512*512 Secret Message Size 9.10kb 9.10kb 9.10kb 9.10kb 9.10kb 9.10kb F. Hiding text message of size 18.2 kb, BMP format The two tables 4 and 5 shows the results of hiding text file with size 18.2 kb and BMP formats with and without reducing Stego Image Size 564kb 267kb 1.04mb 1.00mb 270kb 715kb PSNR MSE 61.1415 60.9739 63.1366 63.6000 61.2621 61.2847 0.0500 0.0520 0.0316 0.0284 0.0486 0.0484 SSIM the text size using the proposed Tree Linked List LSB hiding algorithm. TABLE 4: HIDING RESULT OF TEXT FILE OF SIZE 18.2 KB AND BMP FORMAT WITHOUT REDUCING THE SIZE. Image Original Image Size Airplane Baboon Barbara Boatscolor Lena Pepper 768kb, 512*512 703kb, 500*480 1.18mb, 720*576 1.29mb, 787*576 768kb, 512*512 768kb, 512*512 ISSN: 2231-5381 Secret Message Size 18.2kb 18.2kb 18.2kb 18.2kb 18.2kb 18.2kb Stego Image Size 565kb 290kb 1.05mb 1.00mb 291kb 715kb http://www.ijettjournal.org PSNR MSE SSIM 56.9990 56.8676 58.8964 59.4101 57.0698 57.0833 0.1298 0.1338 0.0838 0.0745 0.1277 0.1273 0.9991 Page 212 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 TABLE 5: HIDING RESULT OF TEXT FILE OF SIZE 18.2 KB AND BMP FORMAT WITH REDUCING SIZE. Image Original Image Size Airplane Baboon Barbara Boatscolor Lena Pepper 768kb, 512*512 703kb, 500*480 1.18mb, 720*576 1.29mb, 787*576 768kb, 512*512 768kb, 512*512 Secret Message Size 18.2kb 18.2kb 18.2kb 18.2kb 18.2kb 18.2kb Stego Image Size 565kb 276kb 1.04mb 1.00mb 278kb 715kb PSNR MSE SSIM 58.2981 58.0726 60.1816 60.6958 58.3614 58.3792 0.0962 0.1014 0.0624 0.0554 0.0948 0.0944 The following diagrams shows the results of hiding text file with size 9.10 kb and 18.2 kb of BMP formats with and without reducing the text size using the proposed Tree Linked List LSB hiding algorithm. Fig 7. MSE values for Cover and Stego Images of BMP format Fig 5. Cover and Stego Image of BMP format Fig 8. SSIM values for Cover and Stego Images of BMP format Fig 6. PSNR values for Cover and Stego Images of BMP format TABLE 6: COVER IMAGES OF PNG FORMAT Airplane baboon Lena G. Hiding text message of size 9.10 kb, PNG format. The two tables 7 and 8 shows the results of hiding text file with size 9.10 kb and PNG formats with and without reducing Pepper Fruit the text size using the proposed Tree Linked List LSB hiding algorithm. TABLE 7: HIDING RESULT OF TEXT FILE OF SIZE 9.10 KB AND PNG FORMAT WITHOUT REDUCING THE SIZE Image Original Image Size Airplane Baboon Lena Pepper Fruits 439KB, 512*512 635kb, 512*512 463kb, 512*512 526kb, 512*512 461kb, 512*512 ISSN: 2231-5381 Secret Message Size 9.10kb 9.10kb 9.10kb 9.10kb 9.10kb Stego Image Size 565kb 735kb 718kb 715kb 579kb http://www.ijettjournal.org PSNR MSE 59.8547 60.0255 59.9946 60.0248 59.9400 0.0672 0.0646 0.0651 0.0647 0.0659 SSIM Page 213 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 TABLE 8: HIDING RESULT OF TEXT FILE OF SIZE 9.10 KB AND PNG FORMAT WITH REDUCING SIZE. Image Original Image Size Airplane Baboon Lena Pepper Fruits 439KB, 512*512 635kb, 512*512 463kb, 512*512 526kb, 512*512 461kb, 512*512 Secret Message Size 9.10kb 9.10kb 9.10kb 9.10kb 9.10kb H. Hiding text message of size 18.2 kb, PNG format. The two tables 9,10 shows the results of hiding text file with size 18.2 kb and PNG formats with and without reducing Stego Image Size 564kb 735kb 718kb 715kb 574kb PSNR MSE 61.1415 61.2009 61.2713 61.2847 61.0325 0.0500 0.0493 0.0485 0.0484 0.0513 SSIM the text size using the proposed Tree Linked List LSB hiding algorithm. TABLE 9: HIDING RESULT OF TEXT FILE OF SIZE 18.2 KB AND PNG FORMAT WITHOUT REDUCING THE SIZE Image Original Image Size Airplane Baboon Lena Pepper Fruits 439KB, 512*512 635kb, 512*512 463kb, 512*512 526kb, 512*512 461kb, 512*512 Secret Message Size 18.2kb 18.2kb 18.2kb 18.2kb 18.2kb Stego Image Size 565kb 735kb 718kb 715kb 584kb PSNR MSE 56.9990 57.0598 57.0651 57.0833 57.0101 0.1298 0.1280 0.1278 0.1273 0.1294 SSIM 0.9996 TABLE 10: HIDING RESULT OF TEXT FILE OF SIZE 18.2 KB AND PNG FORMAT BY REDUCING THE SIZE Image Original Image Size Airplane Baboon Lena Pepper Fruits 439KB, 512*512 635kb, 512*512 463kb, 512*512 526kb, 512*512 461kb, 512*512 Secret Message Size 18.2kb 18.2kb 18.2kb 18.2kb 18.2kb Stego Image Size 565kb 735kb 717kb 715kb 578kb PSNR MSE 58.2981 58.3640 58.3269 58.3792 58.1874 0.0962 0.0948 0.0956 0.0944 0.0987 SSIM The following diagrams shows the results of hiding text file with size 9.10 kb and 18.2 kb of PNG formats with and without reducing the text size using the proposed Tree Linked List LSB hiding algorithm. Fig 10. PSNR values for Cover and Stego Images of PNG format Fig 9. Cover and Stego Image of PNG format ISSN: 2231-5381 http://www.ijettjournal.org Page 214 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 Fig 11. MSE values for Cover and Stego Images of PNG format Fig 12. SSIM values for Cover and Stego Images of PNG format TABLE 11: COVER IMAGES OF JPEG FORMAT Lena anime house Chimborazo volcano I. Hiding text message of size 9.10 kb, JPEG format. The two tables 12, 13 shows the results of hiding text file with size 9.10 kb and JPEG formats with and without Sense1 Sence2 reducing the text size using the proposed Tree Linked List LSB hiding algorithm. TABLE 12: HIDING RESULT OF TEXT FILE OF SIZE 9.10 KB AND JPEG FORMAT WITHOUT REDUCING THE SIZE. Image Original Image Size Stego Image Size 547kb 1.12mb 5.84mb 794kb PSNR MSE SSIM 50.1kb, 480*480 60.6kb, 960*720 750kb, 2048*1536 549kb, 752*490 Secret Message Size 9.10kb 9.10kb 9.10kb 9.10kb Lena anime house Chimborazo volcano Sence1 Sence2 59.3830 54.9987 71.2022 61.3581 0.0750 0.2057 0.0049 0.0476 0.9995 0.9986 0.9999 0.9997 50.9kb, 750*449 118kb, 960*720 9.10kb 9.10kb 597kb 1.64mb 57.9089 59.2663 0.1052 0.0770 0.9995 0.9996 TABLE 13: HIDING RESULT OF TEXT FILE OF SIZE 9.10 KB AND JPEG FORMAT WITH REDUCING SIZE. Image Original Image Size Stego Image Size 544kb 1.11mb 5.84mb 791kb PSNR MSE SSIM 50.1kb, 480*480 60.6kb, 960*720 750kb, 2048*1536 549kb, 752*490 Secret Message Size 9.10kb 9.10kb 9.10kb 9.10kb Lena anime house Chimborazo volcano Sence1 Sence2 60.6484 55.0652 72.4232 62.6011 0.0560 0.2026 0.0037 0.0357 0.9996 0.9986 0.9999 0.9997 50.9kb, 750*449 118kb, 960*720 9.10kb 9.10kb 587kb 1.64mb 58.3560 59.6245 0.0949 0.0709 0.9995 0.9997 J. Hiding text message of size 18.2 kb, JPEG format. The two tables 14, 15 shows the results of hiding text file with size 18.2 kb and JPEG formats with and without reducing the text size using the proposed Tree Linked List LSB hiding algorithm. TABLE 14: HIDING RESULT OF TEXT FILE OF SIZE 18.2 KB AND JPEG FORMAT WITHOUT REDUCING THE SIZE. Image Original Image Size Lena anime house Chimborazo volcano Sence1 Sence2 ISSN: 2231-5381 Stego Image Size 553kb 1.13mb 5.85mb 799kb PSNR MSE SSIM 50.1kb, 480*480 60.6kb, 960*720 750kb, 2048*1536 549kb, 752*490 Secret Message Size 18.2kb 18.2kb 18.2kb 18.2kb 56.3532 54.7408 68.1387 58.3508 0.1506 0.2183 0.0100 0.0951 0.9989 0.9984 0.9999 0.9993 50.9kb, 750*449 118kb, 960*720 18.2kb 18.2kb 606kb 1.65mb 56.3420 58.0366 0.1510 0.1022 0.9991 0.9995 http://www.ijettjournal.org Page 215 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 TABLE 15: HIDING RESULT OF TEXT FILE OF SIZE 18.2 KB AND JPEG FORMAT WITH REDUCING SIZE. Image Original Image Size Secret Message Size Stego Image Size PSNR MSE SSIM Lena anime house Chimborazo volcano Sence1 Sence2 50.1kb, 480*480 60.6kb, 960*720 750kb, 2048*1536 549kb, 752*490 18.2kb 18.2kb 18.2kb 18.2kb 548kb 1.12mb 5.84mb 793kb 57.7044 54.8638 69.4036 59.6539 0.1103 0.2122 0.0075 0.0704 0.9992 0.9985 0.9999 0.9995 50.9kb, 750*449 118kb, 960*720 18.2kb 18.2kb 595kb 1.64mb 57.0312 58.6321 0.1288 0.0891 0.9992 0.9996 The following diagrams shows the results of hiding text file with size 9.10 kb and 18.2 kb of JPEG formats with and without reducing the text size using the proposed Tree Linked List LSB hiding algorithm. Fig 16. SSIM values for Cover and Stego Images of JPEG format Fig 13. Cover and Stego Image of JPEG format Fig 14. PSNR values for Cover and Stego Images of JPEG format Fig 15. MSE values for Cover and Stego Images of JPEG format ISSN: 2231-5381 EVALUATION OF THE STEGO IMAGE: From the previous analysis and result we notice that BMP file format is the best, which they decreasing the file size after the hiding process. But in the PNG file format the file size increases by a few rate. However the cons of JPEG file format is increasing the size of the file dramatically. So that the proposed algorithm by reducing the size of the secret message they decreasing the file size by a few rate, and this is pros added to the algorithm. In the PSNR evaluation with the TLLLSB and proposed algorithm has proved that the value of PSNR is a high, and this indicates the quality of stego image. And in the MSE evaluation with the TLLLSB and proposed algorithm has proved that the value of PSNR is low in comparison with the normal hiding of the secret message, and this indicates the quality of stego image. And in the SSIM evaluation with the TLLLSB and proposed algorithm has proved that the value of PSNR is closely to 1, and this indicates the quality of stego image. CONCLUSION The proposed algorithm has proved its effectiveness in terms of hiding capacity, durability and quality of the image and dealing with a different file format. And does not rely on a specific format that increases the efficiency of the algorithm, also is not observed any distortion to it the eye, and the normal file size that is not going on a doubts around him. The high values of PSNR and low values of MSE and SSIM values that very close to 1 indicates the efficiency of the proposed algorithm that is called TLLLSB. We note that the file size is minimizing when using the algorithm of reducing the size of the secret message before hiding, and the image quality becomes highest at hiding by the proposed algorithm. http://www.ijettjournal.org Page 216 International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 4- May 2015 Permanent Address: Department of Computer Science, Faculty REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Jayaram P, Ranganatha H R, Anupama H S,‖ INFORMATION HIDING USING AUDIO STEGANOGRAPHY – A SURVEY‖, The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011, pp. 86-96. Zaidoon Kh, AL-Ani, A.A.Zaidan, B.BZaidan and Hamdan.O.Alanazi, ―Overview: Main Fundamentals for Steganography‖, Journal of Computing,HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCO MPUTING/, Vol.2, Issue 3, March 2010, ISSN: 2151-9617, pp. 158165. Stefan Katzenbeisser, Fabien A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking, 2000 ARTECH HOUSE, USA. Anjali Tiwari, Seema Rani Yadav, N.K. Mittal, ―A Review on Different Image Steganography Techniques‖, International Journal of Engineering and Innovative Technology (IJEIT), ISSN: 2277-3754, Volume 3, Issue 7, January 2014 Abikoye Oluwakemi C., Adewole Kayode S, Oladipupo Ayotunde J, ―Efficient Data Hiding System using Cryptography and Steganography‖, International Journal of Applied Information Systems(IJAIS), Foundation of Computer Science FCS, New York, USA, ISSN: 2249-0868, Vol. 4, No.11, December 2012, pp. 6-11. Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt, ―Digital Image Steganography: Survey and Analysis of Current Methods‖, signal processing, volume 90, Issue 3, March 2010, pp.727752. C.P.Sumathi, T.Santanam and G.Umamaheswari, A Study of Various Steganographic Techniques Used for Information Hiding, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, December 2013 T. Morkel , J.H.P. Eloff , M.S. Olivier , AN OVERVIEW OF IMAGE STEGANOGRAPHY, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science ,University of Pretoria, 0002, Pretoria, South Africa, 2012. Rosziati Ibrahim and Teoh Suk Kuan, Steganography Imaging System(SIS): Hiding Secret Message inside an Image, Proceedings of the World Congress on Engineering and Computer Science 2010 Vol I, WCECS 2010,October 20-22,2010 San Francisco, USA. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Dheiaa Najim, and Lubna Kanaan, ―Steganography in image files: A survey‖, Australian Journal of Basic and Applied Sciences, ISSN: 1991-8178, 7(1), 2013, pp. 35-55. Ms.G.S.Sravanthi, Mrs.B.Sunitha Devi, S.M.Riyazoddin and M.Janga Reddy, ―A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method‖, Global Journal Of Computer Science And Technology Graphics & Vision, Global Journals Inc(USA), ISSN: 0975-4172, Volume 12, Issue 15, Version 1.0, Year 2012, pp. 1-9. Pooja Kausshik and Yuvraj Sharma, ―Comparison of Different Image Enhancement Techniques Based upon Psnr & Mse‖, International Journal of Applied Engineering Research, http://www.ripublication.com/ijaer.htm, ISSN: 0973-4562, Vo1.7, No.11, 2012, pp. 1-5. Yusra A.Y.Al-Najjar, Dr.Der Chen Soong, ―Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI‖, International Journal of Scientific & Engineering Research, ISSN 2229-5518, Vol 3, Issue 8, August-2012, pp.1-5. Tayana Morkel, Image Steganography Applications for Secure Communicaton,May 2012,University of Pertoria, Pertoria. Thesis. Rosanne English, Comparing Steganography Algorithms, master in information technology of university of Glasgow, September 2009 thesis. of computer and Information Technology, Sana’a University, Sana’a, Yemen. Prof. Elsamani Abd Elmutalib Ahmed Abd Elmutalib, Professor, Department of Computer Science, Faculty of computer Science and Information Technology, Alneelain University, Khartoum, Sudan. Dr. Gafar Zen Alabdeen Salh Hassan, Assistant Professor, Department of Computers and Information Technology, University of Jeddah, Faculty of Computers and Information Technology, Khulais, Jeddah, Saudi Arabia.. Permanent Address: Department of Information Technology, Faculty of computer Science and Information Technology, Alneelain University, Khartoum, Sudan. Dr. Abdelmajid Hassan Mansour Emam, Assistant Professor, Department of Computers and Information Technology, University of Jeddah, Faculty of Computers and Information Technology, Khulais, Jeddah, Saudi Arabia. Permanent Address: Department of Information Technology, Faculty of computer Science and Information Technology, Alneelain University, Khartoum, Sudan. BIOGRAPHY Bassam Hasan Saghir Al-Malhani, Lecturer, Department of Computer Science, Faculty of computer Science and Information Technology, Alneelain University, Khartoum, Sudan. ISSN: 2231-5381 http://www.ijettjournal.org Page 217