SlideShare a Scribd company logo
1 of 6
Download to read offline
A Survey Paper on Different Steganography
Techniques
Shashikant Singh 1
, Seema Yadav 2
, Ankur Raj3
and Priya Gupta4
Assistant Professor
JECRC,Jaipur,Rajasthan,India
shashikant.cse@jecrc.ac.in1
, seemayadav.cse@jecrc.ac.in2
, ankurraj.cse@jecrc.ac.in3
,
priyagupta.cse@jecrc.ac.in4
Abstract
With the rapid advance in digital network, information technology, digital libraries, and
particularly World Wide Web services, many kinds of information could be retrieved
any time. So in this digital scenario invisible communication between two parties is the
prime concern. Steganography is the technique of hidden communication. It not only
hides the message contents, instead it hides the existence of the message. In this paper, a
new image steganography method based on spatial domain is proposed secret data hided
in image segments using least significant bit (LSB) steganography is proposed. The
color image is divided into four equal parts and the secret data is also divided into four
equal parts and those divided data is hided in the image segments using least significant
bit steganography. In this paper we have critically analyzed various steganographic
techniques and also have covered steganography overview its major types,
classification, applications.
Keywords: Steganography, least significant bit, Spatial Domain, MSE, PSNR, NC.
I. Introduction
1. The advancement in digital technology with the advent of computers and internet technology
has brought a revolution by transforming the world into a digital village. Some illegal eavesdroppers
every time try to hack that secret data. For providing security to this secret data in digital medium
there are various techniques are available[1]. Like Cryptography, Steganography, Digital
watermarking etc. Basically Steganography word is derived from two Greek words “Stegos” and
“Grafia” i.e. Steganographic, where Stegos means covered and Grafia means writing it means covered
writing. In this technique secret message is concealed inside a cover object. There are different types
Kalpa Publications in Engineering
Volume 2, 2018, Pages 103–108
Proceedings on International Conference on Emerg-
ing Trends in Expert Applications & Security (2018)
V.K. Chandna, V.S. Rathore and S. Maheshwari (eds.), ICETEAS 2018 (Kalpa Publications in Engineering,
vol. 2), pp. 103–108
of Steganography Techniques are available based on the cover object. Cover Objects can be image,
Audio, Video, Protocols etc. The secret information can be embedded in various types of covers. If
information is embedded in a cover text (text file), the result is a stego-text object. Similarly, it is
possible to have cover audio, video and image for embedding which result in stego-audio, stego-video
and stego-image respectively. The proposed paper provide a systematic survey of existing
Steganography research by categorizing existing methods according to the certain features and
analysing the advantages of these features. The motive of the paper is to provide researchers with
in-depth study of subject.
1.1 CLASSIFICATIONS OF DIGITAL STEGANOGRAPHY
Steganography can be classified according to its importance and goals. So different types of
steganography are as follows:
a) Linguistic steganography: Linguistic steganography is concerned with hiding information
in natural language text. One of the major transformations used in linguistic
steganography is synonym substitution [2]. However, few existing studies have studied
the practical application of this approach.
Fig.1. Types of Steganography[2]
b) Semagrams: It uses only symbols and signs to hide the information. It is further categorized into
two ways:
i) Visual Semagrams: A visual semagrams uses physical objects used every day to convey
a message. For example: the positioning of items on a particular website.
ii) Text Semagrams: This type is used to hides a message by modify the appearance of the
carrier text, or by changing font size and type, or by adding extra space between words
and by using different flourished in letters or handwritten text[3].
c) Image Steganography: Taking the cover object as image in steganography is known as image
steganography. Generally, in this technique pixel intensities are used to hide the information.
d) Network Steganography: When taking cover object as network protocol, such as TCP,UDP,
A Survey Paper on different Steganography Techniques S. K. Singh et al.
104
ICMP, IP etc, where protocol is used as carrier, is known as network protocol steganography. In the
OSI network layer model there exist covert channels where steganography can be achieved in unused
header bits of TCP/IP fields[4&5]..
e) Video Steganography: Video Steganography is a technique to hide any kind of files or information
into digital video format. Video (combination of pictures) is used as carrier for hidden information.
f) Audio Steganography: When taking audio as a carrier for information hiding it is called audio
steganography. It has become very significant medium due to voice over IP (VOIP) popularity. Audio
steganography uses digital audio formats such as WAVE, MIDI, AVI MPEG or etc for
steganography[6].
g) Text Steganography: General technique in text steganography, such as number of tabs,white
spaces, capital letters, just like Morse code and etc is used to achieve information hiding.
Fig.2. Block diagram of Image steganography[4]
II.LSB Method:
In LSB steganography, the least significant bits of the cover media’s digital data are used to conceal
the message. The simplest of the LSB steganography techniques is LSB replacement. LSB
replacement steganography flips the last bit of each of the data values to reflect the message that
needs to be hidden[7]. Consider an 8-bitgrayscale bitmap image where each pixel is stored as a byte
representing a gray scale value. Suppose the first eight pixels of the original image have the following
gray scale values.
11010010 01001010 10010111 10001100
00010101 01010111 00100110 01000011
To hide the letter C whose binary value is 10000011, we would replace the LSBs of these pixels to
have the following new grayscale values:
11010011 01001010 10010110 10001100
00010100 01010110 00100111 01000011
In the above example only half the LSBs need to change. [12] The difference between the cover (i.e.
A Survey Paper on different Steganography Techniques S. K. Singh et al.
105
original) image and the stego image will be hardly noticeable to the human eye. However, one of its
major limitations is small size of data which can be embedded in such type of images using only LSB.
LSB is extremely vulnerable to attacks. LSB techniques implemented to 24 bit formats for the color
image are difficult to detect contrary to 8 bit format[8]. It is observed that there are little differences in
the histograms of cover and stego image of Lena. For other images, similar characteristics are
obtained.
Fig.3. Cover and Stego Images of Halena: (a) Cover Image and RGB Histograms (b) Stego Image and RGB
Histogram[3]
From above experimental results, it is apparent that each stego-image is almost analogous to
corresponding cover image and shows better imperceptibility. That is, deterioration of the quality of
images due to the embedding of the secret messages cannot be distinguished.
III. ADVANTAGES
Steganography has unique advantages for net-espionage agents. Even if a file is known or suspected
to contain Steganographic software, it is almost impossible to extract the information until the correct
password is obtained. Steganography is beneficial for securely storing sensitive data, such as hiding
system passwords or keys within other files[9]. In places where standard cryptography and encryption
is outlawed, Steganography can be used for covert data transmission.
IV. CONCLUSION
Steganography is the art and science of writing hidden messages in such a way that no one, apart from
the sender and intended recipient, suspects the existence of the message. It is therefore a book on
magic. It is emerging in its peak because it does not attract anyone by itself [24].In this paper, analysis
of Global Journal of Computer Science and Technology Volume XIII Issue IV Version I 13 ( ) Year
A Survey Paper on different Steganography Techniques S. K. Singh et al.
106
013 2 F © 2013 Global Journals Inc. (US) A Review of Comparison Techniques of Image
Steganography LSB, DCT & DWT methods has been successfully implemented and results are
delivered. The MSE and PSNR of the methods are also compared and also this paper presented a
background discussion and implementation on the major algorithms of steganography deployed in
digital image[10].
V . FUTURE SCOPE
Still efforts have to be made to increase the embedding capacity and maintain secrecy. In this method
we can hide text file equal to the size of the image. Efforts can be made to hide text files having more
size than image size. The secret keys have to be known to both sender and receiver. Keys are not sent
in cover-images but are distributed separately. A technique can be evolved so that these keys can be
generated and distributed covertly. The Transform Domain method can be utilized if more security is
required[11]. If Steganography is used with Cryptography, it will prove to be an unbeatable tool in
secure communication links. Security of the scheme can be improved by using advanced
cryptography techniques and also improve the efficiency by using data compression techniques.
References:
[1]. A. A. Ali and A. H. Seddik, “Image Steganography Technique By Using Braille Method of Blind
People (LSBraille)”, International Journal of Image Processing (IJIP), Vol. 7, Issue 1,PP. 81-89, 2013.
[2] A. Ahmed, N. Agrawal, and S. Banerjee, “Image steganography by closest pixel-pair mapping”,
IEEE- International Conference On Computing, Communications and Informatics (ICACCI), PP.
1971 - 1975, 24-27 Sept. 2014.
[3] A. Nag, S. Ghosh, S. Biswas, D. Sakar, and P.P. Sakar, “An Image Steganography Technique
using X-Box Mapping”, IEEE- International Conference On Advances In Engineering, Science and
Management(ICAESM-2012), Vol. 3, Issue 12, PP. 709-713, March 2012.
[4] A. A. Ali and A. H. Seddik, “New Image Steganography Method By Matching Secret Message
With Pixels Of Cover Image (SMM)”, International Journal of Computer Science Engineering and
Information Technology Research (IJCSITR), Vol. 3, Issue 2 ,PP. 1-10, Jun 2013.
[5] S. Nazari, A-M. Eftekhari, and M. Sh. Moin, “Secure Information Transmission using
Steganography and Morphological Associative Memory”, International Journal of Computer
Applications, Vol. 61, No. 7, PP. 23-29, January 2013.
[6] K.Thangadurai and G.Sudha Devi, “An analysis of LSB based image Steganography techniques,”
Computer Communication and Informatics (ICCCI), International Conference on 3-5 Jan. 2014, pp.1
– 4, Publisher: IEEE.
A Survey Paper on different Steganography Techniques S. K. Singh et al.
107
[7] Amritpal Singh and Harpal Singh, “An improved LSB based image Steganography technique for
RGB images,” Electrical, Computer and Communication Technologies (ICECCT), IEEE International
Conference on 5-7 March 2015, pp. 1- 4.
[8] Deepesh Rawat and Vijaya Bhandari, “ A Steganography Technique for Hiding Image in an
image using LSB Method for 24 Bit color Image,” International Journal of Computer Application
(0975-8887) Volume 64-No.20, February 2013.
[9] Rawat D., Bhandari V., Steganography Technique for Hiding Text Information in Color Image
using Improved LSB Method, International Journal of Computer Applications 67(1) (2013), 22- 25.
[10] A. Saha, S. Halder and S. Kollya, “Image Steganography using 24-bit Bitmap Images”,
Proceedings of the 14th International Conference on Computer and Information Technology (ICCIT),
Bangladesh, (2011) Noveber 22-24.
[11] M. O. Islam, “A High Embedding Capacity Image Steganography using Stream Builder and
Parity Checker”, Proceedings of the 15th International Conference on Computer and Information
Technology (ICCIT), Dhaka, Bangladesh, (2012) Noveber 22-24.
[12] N. Akhtar, S. Khan and P. Johri, “An Improved Inverted LSB Image Steganography”,
Proceedings of the International Conference on Issues and Challenges in Intelligent Computing
Techniques (ICICT), (2014) February 7-8.
A Survey Paper on different Steganography Techniques S. K. Singh et al.
108

More Related Content

Similar to A Survey Paper On Different Steganography Technique

Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingKamal Pradhan
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 

Similar to A Survey Paper On Different Steganography Technique (20)

Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
D010312230
D010312230D010312230
D010312230
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image Shielding
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 

More from Jeff Brooks

Freedom Writers Wiki, Synopsis, Reviews, Watch A
Freedom Writers Wiki, Synopsis, Reviews, Watch AFreedom Writers Wiki, Synopsis, Reviews, Watch A
Freedom Writers Wiki, Synopsis, Reviews, Watch AJeff Brooks
 
IELTS Academic Essay Writing Tips For A Better Score
IELTS Academic Essay Writing Tips For A Better ScoreIELTS Academic Essay Writing Tips For A Better Score
IELTS Academic Essay Writing Tips For A Better ScoreJeff Brooks
 
Posted On March 31, 2017. Online assignment writing service.
Posted On March 31, 2017. Online assignment writing service.Posted On March 31, 2017. Online assignment writing service.
Posted On March 31, 2017. Online assignment writing service.Jeff Brooks
 
Best Custom Writing Service. Best Custom Writing Service
Best Custom Writing Service. Best Custom Writing ServiceBest Custom Writing Service. Best Custom Writing Service
Best Custom Writing Service. Best Custom Writing ServiceJeff Brooks
 
Where To Buy Parchment Paper For Writing. Where Can I Buy Parchment
Where To Buy Parchment Paper For Writing. Where Can I Buy ParchmentWhere To Buy Parchment Paper For Writing. Where Can I Buy Parchment
Where To Buy Parchment Paper For Writing. Where Can I Buy ParchmentJeff Brooks
 
100 College Application Essay Topics. Online assignment writing service.
100 College Application Essay Topics. Online assignment writing service.100 College Application Essay Topics. Online assignment writing service.
100 College Application Essay Topics. Online assignment writing service.Jeff Brooks
 
Moduladmission Essay Essay For University
Moduladmission Essay Essay For UniversityModuladmission Essay Essay For University
Moduladmission Essay Essay For UniversityJeff Brooks
 
MDA . Online assignment writing service.
MDA  . Online assignment writing service.MDA  . Online assignment writing service.
MDA . Online assignment writing service.Jeff Brooks
 
Introduction About Yourself Essay Examples Sitedoct
Introduction About Yourself Essay Examples SitedoctIntroduction About Yourself Essay Examples Sitedoct
Introduction About Yourself Essay Examples SitedoctJeff Brooks
 
Sociology Essay Topics. Online assignment writing service.
Sociology Essay Topics. Online assignment writing service.Sociology Essay Topics. Online assignment writing service.
Sociology Essay Topics. Online assignment writing service.Jeff Brooks
 
How To Write A Proposal Examples.Project-Proposa
How To Write A Proposal Examples.Project-ProposaHow To Write A Proposal Examples.Project-Proposa
How To Write A Proposal Examples.Project-ProposaJeff Brooks
 
How To Write A College Essay -- Bid4Papers Guide
How To Write A College Essay -- Bid4Papers GuideHow To Write A College Essay -- Bid4Papers Guide
How To Write A College Essay -- Bid4Papers GuideJeff Brooks
 
Literature Review Sample UK. Not Sure. Online assignment writing service.
Literature Review Sample UK. Not Sure. Online assignment writing service.Literature Review Sample UK. Not Sure. Online assignment writing service.
Literature Review Sample UK. Not Sure. Online assignment writing service.Jeff Brooks
 
10 Tips How To Write A Debate Essay In 2023 - At
10 Tips How To Write A Debate Essay In 2023 - At10 Tips How To Write A Debate Essay In 2023 - At
10 Tips How To Write A Debate Essay In 2023 - AtJeff Brooks
 
Accountants Report Sample Example Format Compilati
Accountants Report Sample Example Format CompilatiAccountants Report Sample Example Format Compilati
Accountants Report Sample Example Format CompilatiJeff Brooks
 
How To Write A Informal Letter Essay - Agnew Text
How To Write A Informal Letter Essay - Agnew TextHow To Write A Informal Letter Essay - Agnew Text
How To Write A Informal Letter Essay - Agnew TextJeff Brooks
 
Create Chinese Character Practice Writing Sheets
Create Chinese Character Practice Writing SheetsCreate Chinese Character Practice Writing Sheets
Create Chinese Character Practice Writing SheetsJeff Brooks
 
Importance Of Reviews To Find Be. Online assignment writing service.
Importance Of Reviews To Find Be. Online assignment writing service.Importance Of Reviews To Find Be. Online assignment writing service.
Importance Of Reviews To Find Be. Online assignment writing service.Jeff Brooks
 
Critical Essay Topics For Exemplification Essay
Critical Essay Topics For Exemplification EssayCritical Essay Topics For Exemplification Essay
Critical Essay Topics For Exemplification EssayJeff Brooks
 
Printable High School Report Writing Template Examples
Printable High School Report Writing Template ExamplesPrintable High School Report Writing Template Examples
Printable High School Report Writing Template ExamplesJeff Brooks
 

More from Jeff Brooks (20)

Freedom Writers Wiki, Synopsis, Reviews, Watch A
Freedom Writers Wiki, Synopsis, Reviews, Watch AFreedom Writers Wiki, Synopsis, Reviews, Watch A
Freedom Writers Wiki, Synopsis, Reviews, Watch A
 
IELTS Academic Essay Writing Tips For A Better Score
IELTS Academic Essay Writing Tips For A Better ScoreIELTS Academic Essay Writing Tips For A Better Score
IELTS Academic Essay Writing Tips For A Better Score
 
Posted On March 31, 2017. Online assignment writing service.
Posted On March 31, 2017. Online assignment writing service.Posted On March 31, 2017. Online assignment writing service.
Posted On March 31, 2017. Online assignment writing service.
 
Best Custom Writing Service. Best Custom Writing Service
Best Custom Writing Service. Best Custom Writing ServiceBest Custom Writing Service. Best Custom Writing Service
Best Custom Writing Service. Best Custom Writing Service
 
Where To Buy Parchment Paper For Writing. Where Can I Buy Parchment
Where To Buy Parchment Paper For Writing. Where Can I Buy ParchmentWhere To Buy Parchment Paper For Writing. Where Can I Buy Parchment
Where To Buy Parchment Paper For Writing. Where Can I Buy Parchment
 
100 College Application Essay Topics. Online assignment writing service.
100 College Application Essay Topics. Online assignment writing service.100 College Application Essay Topics. Online assignment writing service.
100 College Application Essay Topics. Online assignment writing service.
 
Moduladmission Essay Essay For University
Moduladmission Essay Essay For UniversityModuladmission Essay Essay For University
Moduladmission Essay Essay For University
 
MDA . Online assignment writing service.
MDA  . Online assignment writing service.MDA  . Online assignment writing service.
MDA . Online assignment writing service.
 
Introduction About Yourself Essay Examples Sitedoct
Introduction About Yourself Essay Examples SitedoctIntroduction About Yourself Essay Examples Sitedoct
Introduction About Yourself Essay Examples Sitedoct
 
Sociology Essay Topics. Online assignment writing service.
Sociology Essay Topics. Online assignment writing service.Sociology Essay Topics. Online assignment writing service.
Sociology Essay Topics. Online assignment writing service.
 
How To Write A Proposal Examples.Project-Proposa
How To Write A Proposal Examples.Project-ProposaHow To Write A Proposal Examples.Project-Proposa
How To Write A Proposal Examples.Project-Proposa
 
How To Write A College Essay -- Bid4Papers Guide
How To Write A College Essay -- Bid4Papers GuideHow To Write A College Essay -- Bid4Papers Guide
How To Write A College Essay -- Bid4Papers Guide
 
Literature Review Sample UK. Not Sure. Online assignment writing service.
Literature Review Sample UK. Not Sure. Online assignment writing service.Literature Review Sample UK. Not Sure. Online assignment writing service.
Literature Review Sample UK. Not Sure. Online assignment writing service.
 
10 Tips How To Write A Debate Essay In 2023 - At
10 Tips How To Write A Debate Essay In 2023 - At10 Tips How To Write A Debate Essay In 2023 - At
10 Tips How To Write A Debate Essay In 2023 - At
 
Accountants Report Sample Example Format Compilati
Accountants Report Sample Example Format CompilatiAccountants Report Sample Example Format Compilati
Accountants Report Sample Example Format Compilati
 
How To Write A Informal Letter Essay - Agnew Text
How To Write A Informal Letter Essay - Agnew TextHow To Write A Informal Letter Essay - Agnew Text
How To Write A Informal Letter Essay - Agnew Text
 
Create Chinese Character Practice Writing Sheets
Create Chinese Character Practice Writing SheetsCreate Chinese Character Practice Writing Sheets
Create Chinese Character Practice Writing Sheets
 
Importance Of Reviews To Find Be. Online assignment writing service.
Importance Of Reviews To Find Be. Online assignment writing service.Importance Of Reviews To Find Be. Online assignment writing service.
Importance Of Reviews To Find Be. Online assignment writing service.
 
Critical Essay Topics For Exemplification Essay
Critical Essay Topics For Exemplification EssayCritical Essay Topics For Exemplification Essay
Critical Essay Topics For Exemplification Essay
 
Printable High School Report Writing Template Examples
Printable High School Report Writing Template ExamplesPrintable High School Report Writing Template Examples
Printable High School Report Writing Template Examples
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

A Survey Paper On Different Steganography Technique

  • 1. A Survey Paper on Different Steganography Techniques Shashikant Singh 1 , Seema Yadav 2 , Ankur Raj3 and Priya Gupta4 Assistant Professor JECRC,Jaipur,Rajasthan,India shashikant.cse@jecrc.ac.in1 , seemayadav.cse@jecrc.ac.in2 , ankurraj.cse@jecrc.ac.in3 , priyagupta.cse@jecrc.ac.in4 Abstract With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications. Keywords: Steganography, least significant bit, Spatial Domain, MSE, PSNR, NC. I. Introduction 1. The advancement in digital technology with the advent of computers and internet technology has brought a revolution by transforming the world into a digital village. Some illegal eavesdroppers every time try to hack that secret data. For providing security to this secret data in digital medium there are various techniques are available[1]. Like Cryptography, Steganography, Digital watermarking etc. Basically Steganography word is derived from two Greek words “Stegos” and “Grafia” i.e. Steganographic, where Stegos means covered and Grafia means writing it means covered writing. In this technique secret message is concealed inside a cover object. There are different types Kalpa Publications in Engineering Volume 2, 2018, Pages 103–108 Proceedings on International Conference on Emerg- ing Trends in Expert Applications & Security (2018) V.K. Chandna, V.S. Rathore and S. Maheshwari (eds.), ICETEAS 2018 (Kalpa Publications in Engineering, vol. 2), pp. 103–108
  • 2. of Steganography Techniques are available based on the cover object. Cover Objects can be image, Audio, Video, Protocols etc. The secret information can be embedded in various types of covers. If information is embedded in a cover text (text file), the result is a stego-text object. Similarly, it is possible to have cover audio, video and image for embedding which result in stego-audio, stego-video and stego-image respectively. The proposed paper provide a systematic survey of existing Steganography research by categorizing existing methods according to the certain features and analysing the advantages of these features. The motive of the paper is to provide researchers with in-depth study of subject. 1.1 CLASSIFICATIONS OF DIGITAL STEGANOGRAPHY Steganography can be classified according to its importance and goals. So different types of steganography are as follows: a) Linguistic steganography: Linguistic steganography is concerned with hiding information in natural language text. One of the major transformations used in linguistic steganography is synonym substitution [2]. However, few existing studies have studied the practical application of this approach. Fig.1. Types of Steganography[2] b) Semagrams: It uses only symbols and signs to hide the information. It is further categorized into two ways: i) Visual Semagrams: A visual semagrams uses physical objects used every day to convey a message. For example: the positioning of items on a particular website. ii) Text Semagrams: This type is used to hides a message by modify the appearance of the carrier text, or by changing font size and type, or by adding extra space between words and by using different flourished in letters or handwritten text[3]. c) Image Steganography: Taking the cover object as image in steganography is known as image steganography. Generally, in this technique pixel intensities are used to hide the information. d) Network Steganography: When taking cover object as network protocol, such as TCP,UDP, A Survey Paper on different Steganography Techniques S. K. Singh et al. 104
  • 3. ICMP, IP etc, where protocol is used as carrier, is known as network protocol steganography. In the OSI network layer model there exist covert channels where steganography can be achieved in unused header bits of TCP/IP fields[4&5].. e) Video Steganography: Video Steganography is a technique to hide any kind of files or information into digital video format. Video (combination of pictures) is used as carrier for hidden information. f) Audio Steganography: When taking audio as a carrier for information hiding it is called audio steganography. It has become very significant medium due to voice over IP (VOIP) popularity. Audio steganography uses digital audio formats such as WAVE, MIDI, AVI MPEG or etc for steganography[6]. g) Text Steganography: General technique in text steganography, such as number of tabs,white spaces, capital letters, just like Morse code and etc is used to achieve information hiding. Fig.2. Block diagram of Image steganography[4] II.LSB Method: In LSB steganography, the least significant bits of the cover media’s digital data are used to conceal the message. The simplest of the LSB steganography techniques is LSB replacement. LSB replacement steganography flips the last bit of each of the data values to reflect the message that needs to be hidden[7]. Consider an 8-bitgrayscale bitmap image where each pixel is stored as a byte representing a gray scale value. Suppose the first eight pixels of the original image have the following gray scale values. 11010010 01001010 10010111 10001100 00010101 01010111 00100110 01000011 To hide the letter C whose binary value is 10000011, we would replace the LSBs of these pixels to have the following new grayscale values: 11010011 01001010 10010110 10001100 00010100 01010110 00100111 01000011 In the above example only half the LSBs need to change. [12] The difference between the cover (i.e. A Survey Paper on different Steganography Techniques S. K. Singh et al. 105
  • 4. original) image and the stego image will be hardly noticeable to the human eye. However, one of its major limitations is small size of data which can be embedded in such type of images using only LSB. LSB is extremely vulnerable to attacks. LSB techniques implemented to 24 bit formats for the color image are difficult to detect contrary to 8 bit format[8]. It is observed that there are little differences in the histograms of cover and stego image of Lena. For other images, similar characteristics are obtained. Fig.3. Cover and Stego Images of Halena: (a) Cover Image and RGB Histograms (b) Stego Image and RGB Histogram[3] From above experimental results, it is apparent that each stego-image is almost analogous to corresponding cover image and shows better imperceptibility. That is, deterioration of the quality of images due to the embedding of the secret messages cannot be distinguished. III. ADVANTAGES Steganography has unique advantages for net-espionage agents. Even if a file is known or suspected to contain Steganographic software, it is almost impossible to extract the information until the correct password is obtained. Steganography is beneficial for securely storing sensitive data, such as hiding system passwords or keys within other files[9]. In places where standard cryptography and encryption is outlawed, Steganography can be used for covert data transmission. IV. CONCLUSION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is therefore a book on magic. It is emerging in its peak because it does not attract anyone by itself [24].In this paper, analysis of Global Journal of Computer Science and Technology Volume XIII Issue IV Version I 13 ( ) Year A Survey Paper on different Steganography Techniques S. K. Singh et al. 106
  • 5. 013 2 F © 2013 Global Journals Inc. (US) A Review of Comparison Techniques of Image Steganography LSB, DCT & DWT methods has been successfully implemented and results are delivered. The MSE and PSNR of the methods are also compared and also this paper presented a background discussion and implementation on the major algorithms of steganography deployed in digital image[10]. V . FUTURE SCOPE Still efforts have to be made to increase the embedding capacity and maintain secrecy. In this method we can hide text file equal to the size of the image. Efforts can be made to hide text files having more size than image size. The secret keys have to be known to both sender and receiver. Keys are not sent in cover-images but are distributed separately. A technique can be evolved so that these keys can be generated and distributed covertly. The Transform Domain method can be utilized if more security is required[11]. If Steganography is used with Cryptography, it will prove to be an unbeatable tool in secure communication links. Security of the scheme can be improved by using advanced cryptography techniques and also improve the efficiency by using data compression techniques. References: [1]. A. A. Ali and A. H. Seddik, “Image Steganography Technique By Using Braille Method of Blind People (LSBraille)”, International Journal of Image Processing (IJIP), Vol. 7, Issue 1,PP. 81-89, 2013. [2] A. Ahmed, N. Agrawal, and S. Banerjee, “Image steganography by closest pixel-pair mapping”, IEEE- International Conference On Computing, Communications and Informatics (ICACCI), PP. 1971 - 1975, 24-27 Sept. 2014. [3] A. Nag, S. Ghosh, S. Biswas, D. Sakar, and P.P. Sakar, “An Image Steganography Technique using X-Box Mapping”, IEEE- International Conference On Advances In Engineering, Science and Management(ICAESM-2012), Vol. 3, Issue 12, PP. 709-713, March 2012. [4] A. A. Ali and A. H. Seddik, “New Image Steganography Method By Matching Secret Message With Pixels Of Cover Image (SMM)”, International Journal of Computer Science Engineering and Information Technology Research (IJCSITR), Vol. 3, Issue 2 ,PP. 1-10, Jun 2013. [5] S. Nazari, A-M. Eftekhari, and M. Sh. Moin, “Secure Information Transmission using Steganography and Morphological Associative Memory”, International Journal of Computer Applications, Vol. 61, No. 7, PP. 23-29, January 2013. [6] K.Thangadurai and G.Sudha Devi, “An analysis of LSB based image Steganography techniques,” Computer Communication and Informatics (ICCCI), International Conference on 3-5 Jan. 2014, pp.1 – 4, Publisher: IEEE. A Survey Paper on different Steganography Techniques S. K. Singh et al. 107
  • 6. [7] Amritpal Singh and Harpal Singh, “An improved LSB based image Steganography technique for RGB images,” Electrical, Computer and Communication Technologies (ICECCT), IEEE International Conference on 5-7 March 2015, pp. 1- 4. [8] Deepesh Rawat and Vijaya Bhandari, “ A Steganography Technique for Hiding Image in an image using LSB Method for 24 Bit color Image,” International Journal of Computer Application (0975-8887) Volume 64-No.20, February 2013. [9] Rawat D., Bhandari V., Steganography Technique for Hiding Text Information in Color Image using Improved LSB Method, International Journal of Computer Applications 67(1) (2013), 22- 25. [10] A. Saha, S. Halder and S. Kollya, “Image Steganography using 24-bit Bitmap Images”, Proceedings of the 14th International Conference on Computer and Information Technology (ICCIT), Bangladesh, (2011) Noveber 22-24. [11] M. O. Islam, “A High Embedding Capacity Image Steganography using Stream Builder and Parity Checker”, Proceedings of the 15th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, (2012) Noveber 22-24. [12] N. Akhtar, S. Khan and P. Johri, “An Improved Inverted LSB Image Steganography”, Proceedings of the International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), (2014) February 7-8. A Survey Paper on different Steganography Techniques S. K. Singh et al. 108