International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 1, February 2019, pp. 460~467 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i1.pp460-467 460 Journal homepage: http://iaescore.com/journals/index.php/IJECE A secure image steganography based on burrows wheeler transform and dynamic bit embedding Ahmed Toman Thahab Department of Electrical and Electronic Engineering, University of Kerbala, Iraq Article Info ABSTRACT Article history: Received Jan 11, 2018 Revised Oct 10, 2018 Accepted Oct 27, 2018 In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence. In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform output. The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods. Keywords: Burrows wheeler transform dynamic embedding Data security Payload XOR Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ahmed T.Thahab, Department of Electrical and Electronic Engineering, University of Kerbala. 104 Al-Mwathafeen Road, Kerbala Province, Iraq. Email: toeahmed@gmail.com 1. INTRODUCTION A technique that conceals secret information inside another variety of information data is termed as steganography [1]. It is broadly used nowadays in information security strategies over the last decade since this kind of invisible communication prevents imperrmissible access to secret information [1]. Although other data security strategies such as cryptography and encryption techniques exist for secure data transmission, steganography uses files such as audio, image, video formats to transmit data oblivious to the fact that data exits in the message [1]. Watermarking is also considered as a hiding technique, but it is used to protect copyright of content such as small tags or company logos. Steganography conceals greater payload in cover media [2]. Essentially, any stenographic system consists of three major components: The cover file where information is hidden; the secret file and the stego-file which is considered as the output resultant from the system. When embedding secret message data in a cover media, it ought to be visually undetectable and the output stego-file should not possess any noticeable adaptation compared to the original cover image [3]. Imperceptibility is crucial factor when it comes to steganography techniques; it reflects the level of correlation between the stego and the cover file. Moreover; other factors such as security and capacity are also considered decisive factors for steganography algorithm. Steganography has been under the scope of researcher for some time since; it is a vital field for covert communication. Secret information can be embedded in the spatial domain specifically in the pixel intensity value [4]. A pioneering embedding method used in steganography is the least significant bit technique (LSB). This technique utilizes the least significant bits of a code-word and replaces them with the most significant bits of the secret binary data. In [5], a new LSB technique is proposed using differencing.