Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30127
Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: Steganography, LSB, encoding, information hiding, color image.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1130233

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 514

References:


[1] Amirtharajan, R., R. Akila, and P. Deepikachowdavarapu. "A comparative analysis of image steganography." International journal of computer applications, Vol. 2, No.3, 2010, pp: 41-47.
[2] Huayong, Ge, Huang Mingsheng, and Wang Qian. "Steganography and Steganalysis based on the digital image." Image and Signal Processing (CISP), 2011 4th International Conference on. Vol. 1. IEEE, 2011.
[3] Nagaraj, V., Dr V. Vijayalakshmi, and Dr G. Zayaraz. “ Modulo based Image Steganography Technique against Statistical and Histogram Analysis." IJCA Special Issue on “Network Security and Cryptography” NSC,2011.
[4] Jagwinder Kaur and Sanjeev Kumar, “Study and Analysis of Various Image Steganography Techniques”, IJCSIT, Vol. 2,No. 3, 2011.
[5] J.J.Garcia-Hernandez, “Exploring reversible digital watermarking in audio signals using additive interpolation error expansions,”in The Eighth International Conference On Intelligent Information Hiding and Multimedia Signal Processing,I.C.Society,Ed.Vol. 8,2012.
[6] Ramaiya, Manoj Kumar, Naveen Hemrajani, and Anil Kishore Saxena. "Improvisation of Security aspect in Steganography applies DES."Communication Systems and Network Technologies (CSNT), 2013 International Conference on. IEEE, 2013.
[7] Dagadita, Monica Adriana, Emil-Ioan Slusanschi, and Razvan Dobre. "Data Hiding Using Steganography." Parallel and Distributed Computing (ISPDC), 2013 IEEE 12th International Symposium on. IEEE, 2013.
[8] Huang, Fangjun, et al. "Distortion function designing for JPEG steganography with uncompressed side-image." Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, 2013.
[9] Jing Liu, Guangming Tang, Yifeng Sun., A secure steganography for privacy protection in healthcare system. Springer, New York, 2013.
[10] P. Thiyagarajan, G. Aghila. "Reversible dynamic, secure steganography for medical image using graph coloring,” Health Policy and Technology, Vol.2, No.3, 2013, pp. 151-161.
[11] Mansi S. Subhedar, Vijay H. Mankar."Current status and key issues in image Steganography.” A survey of computer science review, Vol. 13-14, 2014, pp. 95-113.
[12] Jung, Ki-Hyun, and Kee-Young Yoo. "Steganographic method based on interpolation and LSB substitution of digital images," Multimedia Tools and Application, 2014.
[13] Mahajan, Palak, and Ajay Koul. "CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography,"IOSR Journal of Computer Engineering, VOL. 16, NO. 2, 2014, pp. 44-52.