SlideShare a Scribd company logo
1 of 11
Download to read offline
MTE PRESENTATION
Image
Steganography
CC
DELHI TECHNOLOGICAL
UNIVERSITY
YASH GUPTA
2K20/EC/241
NEXT
What is Steganography ?
Steganography is the science of writing hidden messages in such a way that no one apart from sender and intended recipient
even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted
form.This is where steganography can come into play. While cryptography provides privacy, steganography is intended to
provide secrecy.The aim of steganography is to hide the secret messages and also for communication and transferring of data.
So no one apart from the authorized sender and receiver will be aware of the existence of the secret data
In modern approach, depending on the cover medium, steganography can be divided into four types that are Text Steganography
,Image Steganography ,Audio Steganography ,Video Steganography
Figure 1.1 The same image revealed different hidden numbers when viewed through white, blue, green, and red lights.
An image is nothing more than a two dimensional signal. It is defined by the mathematical
function f(x,y) where x and y are the two co-ordinates horizontal and vertical.
The value of f(x,y) at any point is gives the pixel value at that point of an image.
What is an Image ?
Each number represents the value of the function f(x,y) at any point. In this case the
value 128 , 230 ,123 each represents an individual pixel value.
The dimensions of the picture is actually the dimensions of this two dimensional array.
I will be performing Image steganography so lets discuss what an image is
128
232
80 255
123
230 123
321
255
Figure 1.2 Original Image
The Least Significant Bit (LSB) technique modifies and replaces the last bit of each pixel with the secret message's data bit.
Basic Principle
A digital image is made up of a finite number of digital values called pixels. Pixels are the tiniest individual elements in an image,
storing values that represent a given color's brightness at any given time.
As a result, an image can be thought of as a pixel matrix (or two-dimensional array) with a predetermined number of rows and
columns.
As can be seen , changing the MSB has a larger impact on the final value than changing the LSB, so we use least significant bit
steganography.
1
0 1
1
1 1
1
1
MSB LSB
Value - 255
Value - 127
Huge Change in bytes Minimal Change in bytes
Value - 254
1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 0
Figure 1.3 Cover Image
[(225),(155),(99),(15),(155),(63),(1),(99),(219),(69),(18),(25)]
[(224),(154),(99),(14),(154),(63),(1),(99,(219),(69),(18),(25)]
How LSB technique works ?
Each pixel has an associated value that represents grey scale values ranging from 0 to 255, or 8-bit values.
Let's look at an example of how this technique works. Let's say we want to conceal the message "hi" in a 44 image with the
following pixel values:
Using the ASCII Table, we can convert the secret message into decimal
values and then into binary: 01101000110101. Now we convert each pixel
value to binary and replace each least significant bit with the message bits
in order (for example, 225 is 11100001, and we replace the last bit with the
first data bit(0), and so on). The pixel values will only change by +1 or -1,
which will be barely noticeable.
here is the changed pixel values they will have a minimal effect on image
Cover Image
Cover Image
Text
Stego Image
Text
Encryption Algorithm
Encryption Algorithm
Figure 1.4 Working of LSB
The following is the methodology used by the programme:
Algorithm for LSB
Cover Image: The image which is to be used to hide the data.
Stego Image: The image which has been embedded with the hidden data.
Convert the secret message to binary format.
Convert the image on the cover to grayscale. (Using grayscale is more convenient because an 8-bit per pixel grayscale image
has 8 bit sequences versus a 24-bit per pixel colored image with 24-bit sequences.)
Take the intensity value (which ranges from 0 to 255) for each pixel in the image and convert it to binary format.
Replace the right-most bit, also known as the LSB, with a bit from the secret message.
Repeat until all of the secret message's bits have been embedded. After that, the image will be referred to as a stego image.
Implementation
After running the first set of the code the original image would be displayed
After excecuting the second part the user will have to input the message which is to be hidden in the image. Here the message
"Matrix Laboratory" is used as an example for message that needs to be hidden.
Figure 1.7 Original Image
Implementation
After the message input by the used the program will return the grey scaled image that is cover image and stego image which
stores the hidden message at the output
Finally, the decoding programme will be run to uncover the stego image's hidden message using the same technique through
which the image is encoded
Figure 1.8 Cover & Stego Images
This method is very fast and easy to implementin comparison to other methods of steganography
The output image has very slightly difference to the input image
Instead of embedding the message in only the LSB we can embed the message in last two LSBs thus embedding even large
messages
This method forms the basics of many other complex algorithms
Instead of embedding the messages in only the LSB, we can embed the messages in last two LSBs,thus embedding even large
messages
This type of encodin the data is weak since it can be easily decoded by taking the LSB of the image and getting the message
in binary fomat
This method is too old because it was used long ago when other encodin methods were not yet developed.
When embedding the message in more than one LSB, the image quality may reduce depending on how many pixels are
changed.
Advantages
Disadvantages
Advantages & Disadvantags
Image steganography is used in Cyber Forensics
It is also used by Intelligence services
Copyright and to avoid piracy of intellectual rights
Secure Highly confidential files and data
Protect original data from unknown sources.
Applications
Mujtiba, Syed & Yousu, Salihah & Bisma, Syed & Siddiqi, Mehvish & Khaki, Zahidgulzar. (2017). COMPARISION OF LSB AND
DWT STEGANOGRAPHY TECHNIQUES. 10.21090/IJAERD.ETIECE08.
Macit, Hüseyin & Koyun, Arif & Güngör, Orhan. (2018). A REVIEW AND COMPARISON OF STEGANOGRAPHY TECHNIQUES.
Fahim Irfan et. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International
Journal of EST,
Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”,
International Journal of Security, Vol.5 Iss. 2 pp. 51-61.
References

More Related Content

What's hot

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Steganography
SteganographySteganography
Steganography
Sonam M
 

What's hot (20)

Audio steganography
Audio steganography Audio steganography
Audio steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Image Steganography using MATLAB

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 

Similar to Image Steganography using MATLAB (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
G0210032039
G0210032039G0210032039
G0210032039
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Image_steganography.pptx
Image_steganography.pptxImage_steganography.pptx
Image_steganography.pptx
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 

Recently uploaded

Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Lovely Professional University
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 
1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design
AshishSingh1301
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 

Recently uploaded (20)

Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 

Image Steganography using MATLAB

  • 2. What is Steganography ? Steganography is the science of writing hidden messages in such a way that no one apart from sender and intended recipient even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted form.This is where steganography can come into play. While cryptography provides privacy, steganography is intended to provide secrecy.The aim of steganography is to hide the secret messages and also for communication and transferring of data. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data In modern approach, depending on the cover medium, steganography can be divided into four types that are Text Steganography ,Image Steganography ,Audio Steganography ,Video Steganography Figure 1.1 The same image revealed different hidden numbers when viewed through white, blue, green, and red lights.
  • 3. An image is nothing more than a two dimensional signal. It is defined by the mathematical function f(x,y) where x and y are the two co-ordinates horizontal and vertical. The value of f(x,y) at any point is gives the pixel value at that point of an image. What is an Image ? Each number represents the value of the function f(x,y) at any point. In this case the value 128 , 230 ,123 each represents an individual pixel value. The dimensions of the picture is actually the dimensions of this two dimensional array. I will be performing Image steganography so lets discuss what an image is 128 232 80 255 123 230 123 321 255 Figure 1.2 Original Image
  • 4. The Least Significant Bit (LSB) technique modifies and replaces the last bit of each pixel with the secret message's data bit. Basic Principle A digital image is made up of a finite number of digital values called pixels. Pixels are the tiniest individual elements in an image, storing values that represent a given color's brightness at any given time. As a result, an image can be thought of as a pixel matrix (or two-dimensional array) with a predetermined number of rows and columns. As can be seen , changing the MSB has a larger impact on the final value than changing the LSB, so we use least significant bit steganography. 1 0 1 1 1 1 1 1 MSB LSB Value - 255 Value - 127 Huge Change in bytes Minimal Change in bytes Value - 254 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 Figure 1.3 Cover Image
  • 5. [(225),(155),(99),(15),(155),(63),(1),(99),(219),(69),(18),(25)] [(224),(154),(99),(14),(154),(63),(1),(99,(219),(69),(18),(25)] How LSB technique works ? Each pixel has an associated value that represents grey scale values ranging from 0 to 255, or 8-bit values. Let's look at an example of how this technique works. Let's say we want to conceal the message "hi" in a 44 image with the following pixel values: Using the ASCII Table, we can convert the secret message into decimal values and then into binary: 01101000110101. Now we convert each pixel value to binary and replace each least significant bit with the message bits in order (for example, 225 is 11100001, and we replace the last bit with the first data bit(0), and so on). The pixel values will only change by +1 or -1, which will be barely noticeable. here is the changed pixel values they will have a minimal effect on image Cover Image Cover Image Text Stego Image Text Encryption Algorithm Encryption Algorithm Figure 1.4 Working of LSB
  • 6. The following is the methodology used by the programme: Algorithm for LSB Cover Image: The image which is to be used to hide the data. Stego Image: The image which has been embedded with the hidden data. Convert the secret message to binary format. Convert the image on the cover to grayscale. (Using grayscale is more convenient because an 8-bit per pixel grayscale image has 8 bit sequences versus a 24-bit per pixel colored image with 24-bit sequences.) Take the intensity value (which ranges from 0 to 255) for each pixel in the image and convert it to binary format. Replace the right-most bit, also known as the LSB, with a bit from the secret message. Repeat until all of the secret message's bits have been embedded. After that, the image will be referred to as a stego image.
  • 7. Implementation After running the first set of the code the original image would be displayed After excecuting the second part the user will have to input the message which is to be hidden in the image. Here the message "Matrix Laboratory" is used as an example for message that needs to be hidden. Figure 1.7 Original Image
  • 8. Implementation After the message input by the used the program will return the grey scaled image that is cover image and stego image which stores the hidden message at the output Finally, the decoding programme will be run to uncover the stego image's hidden message using the same technique through which the image is encoded Figure 1.8 Cover & Stego Images
  • 9. This method is very fast and easy to implementin comparison to other methods of steganography The output image has very slightly difference to the input image Instead of embedding the message in only the LSB we can embed the message in last two LSBs thus embedding even large messages This method forms the basics of many other complex algorithms Instead of embedding the messages in only the LSB, we can embed the messages in last two LSBs,thus embedding even large messages This type of encodin the data is weak since it can be easily decoded by taking the LSB of the image and getting the message in binary fomat This method is too old because it was used long ago when other encodin methods were not yet developed. When embedding the message in more than one LSB, the image quality may reduce depending on how many pixels are changed. Advantages Disadvantages Advantages & Disadvantags
  • 10. Image steganography is used in Cyber Forensics It is also used by Intelligence services Copyright and to avoid piracy of intellectual rights Secure Highly confidential files and data Protect original data from unknown sources. Applications
  • 11. Mujtiba, Syed & Yousu, Salihah & Bisma, Syed & Siddiqi, Mehvish & Khaki, Zahidgulzar. (2017). COMPARISION OF LSB AND DWT STEGANOGRAPHY TECHNIQUES. 10.21090/IJAERD.ETIECE08. Macit, Hüseyin & Koyun, Arif & Güngör, Orhan. (2018). A REVIEW AND COMPARISON OF STEGANOGRAPHY TECHNIQUES. Fahim Irfan et. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International Journal of EST, Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”, International Journal of Security, Vol.5 Iss. 2 pp. 51-61. References