SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 369
Image to Image Encoder using Least Significant Bit
Samthomas Raphael1, Dr. Ganesh D2
1Master of Computer Application, 2Associate Professor,
1,2Jain Deemed-to-be University, Bengaluru, Karnataka, India
ABSTRACT
The purpose of “Image to Image Encoder” is to hide an image inside another
image. Using the LSB method, which facilitates data hiding in an image. It
works with JPEG and PNG formats for the cover image and always creates tiff
encoded image due to its compression.LeastSignificant BitEmbeddings(LSB)
are the general steganographic procedure that might be utilized to install
information into a variety of digital media, the most studied applications are
utilizing LSB embedding to hide one picture inside another. The security to
keep up secrecy of message is accomplished by making it infeasible for a third
individual to distinguish and recover the secret message.
This method can be used in various fields for data security like for secret
communication and data transfer via networks, for storing and transferring
sensitive data and information in the defense sector. As the normal viewers
can not identify the slight difference in the encoded image without the
reference of the original cover image, this method ensures more securitythan
cryptographic methods.
KEYWORDS: Digital Image, Secret Image, Cover, Steganography, Encoding,
Decoding, Data Security
How to cite this paper: Samthomas
Raphael | Dr. Ganesh D "Image to Image
Encoder using Least Significant Bit"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-5 |
Issue-4, June 2021,
pp.369-372, URL:
www.ijtsrd.com/papers/ijtsrd41253.pdf
Copyright © 2021 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
Data security has developed asa major issue inouradvanced
life. The advancementofnewtransmissionmethodspowersa
particular strategy ofsafety mechanisms particularlyinstate
of the communication of data or information. As the size of
data transmission across internet increases, the significance
of information security also increases. When these
transferred data are valuable or confidential, intruders or
attackers try to expose, alter or destroy it or use it for more
difficult attacks. This is where the importance of data
protection arises. There are several techniques used for
ensuring personal or private communication of data. While
talking about data, images take a lion’s share in the data that
is shared through the internet.Mostofthetimestheseimages
are of great importance to the people who send or receive it.
It can be personal photographs, confidental images etc. This
is in the case of normal people. When it comes to the data
communication between organisations or governments or
agencies related to them, these images might be of much
more importance that can cause dangerous threats when it
falls on intruders hands. So its crucial to prevent or avoid
attacks or actions to access these data while transferring
them. This project uses steganographic techniquestohidean
image inside another imagesothattheimageinsidethecover
image will be safe from the attackers eyes. These encoded
images can be transferred through internet without the fear
of data thefts since the attackers are unaware of the secret
image inside it.
METHODOLOGIES
A. Least Significant Bit (LSB) Algorithm
The well-known strategy usedforsteganographyistheLeast
Significant Bit. And additionally the prominenttechniquefor
the present day, steganography is to utilize LSB of picture‘s
pixel data. This investigation is utilized for one piece of the
LSB. It inserts each piece of the double content piece with
one piece of every pixel in the first picture. This strategy
works when the record is longerthanthemessagedocument
and if picture is grayscale, when applying LSB strategies to
every byte of a 24 bit picture, three bits can be encoded into
every pixel. Example: We can hide data in images by
replacing the last bit of every color‘s byte with a bit from the
secret image.
B. Existing System
There are several encoding techniques that are oftenusedin
day-today functions to ensure data security. Most of them
are using cryptographic techniques. But when using
cryptography, the data is visible or available to trespassers
who see the data or intruders who tries to access the
protected data even though it is in the encrypted format. If
they have the right tools to decrypt it, they can break the
security easily and decrypt and fetch the protected data. It
means that one way or another, an intruder can figure out
the presence of the hidden data which results in the
compromise of sensitive data.
IJTSRD41253
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 370
C. Proposed System
In this method, we are using steganographic technique instead of cryptography. In this method, the intruders or trespassers
cannot know about the presence of the image which is hidden inside the cover image. Without a referenceoftheoriginal cover
image it is impossible to find the presence of the secret image inside the encoded image. So this method ensures more data
security to the users in data hiding for storage and transfer.
Figure 1: General Process Diagram
D. Steganography vs Cryptography
Cryptography is the method used for the conversion of the data into encrypted format by using the symmetric key and this
process is known as the encryption. The primary drawback of the cryptography approach is that the encrypted data is visible
but we can’t read it. Steganography is the method for data embedding where the data to be kept secret is concealed into the
digital media .In this process the Trespasser can’t be able to see the plaintext or the cipher text because itisconcealingintothe
another media. The trespasser can’t suspect if thereis any confidential data that is existing. The steganography technique is
used for the better security of the data over the computer networks.
E. Process
An image is represented as a set of pixels and each pixel in an image is represented by a coordinate(x,y)witha color, andthese
colors are represented with a tuple with the intensity of three RGB colors (red,green, blue).EachoftheseRGBcolorsgoesfrom
the range of 0 to 255 and we can represent that number as a 8 digit binary number, for example, 192_{10} = 1100
0000_{2}19210=110000002. Now, the most significant bits in that number are 11001100 and the rest (00000000) does not
contribute that much value to the information, so these bits are called least significant bits .
Let’s consider Pillow. Pillow is a friendly fork of of Python Imaging Library, it is very effortless to use and it supports many
image file formats and operations. This can be extended to support even diffrentfileformats.UsingPillowasa virtual canvasto
draw using pixels is easy. An existing image can be read and get not only image but information regarding pixels also. In this
case we want to conceal that secret image inside the covering image. Here is the idea of LSB and MSB comes in to application.
The concept is extracting the MSB from the image to hide and replace it with the Least Significant Bit of the cover up image.At
the end we should generate an image almost identical to the cover but hiding the secret image.
As mentioned before, the idea is very simple, we take the image we want to hide and read the color channel information for a
given pixel, let’s say, pixel (312, 216) has color information (53, 31, 109). Now, we read the same color info from the image we
will use as cover up, (181, 200, 220). Then comes the most important and interesting part, we take the color info one by one,
convert them into binary, 181_{10} = 1011 0101_218110=101101012 for the cover image pixel of the red channel (312, 216)
and 53_{10} = 0011 0101_25310=001101012 for the pixel in the same embedding image, andwetake4bytesmost significant
bits from the embedding image and place them instead of the 4 bytes least significant bits of the covering image (cover up),
resulting 1011 0011_2 = 179_{10}101100112=17910 for the same pixel, notice even in decimal there is no much distance or
difference between the original color channel for red (181_{10}18110) and the resulting secret (179_{10}17910), we
repeatedly perform this process for every pixel of the image and color channel.
Figure 2: Work Flow
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 371
There are number methods to performthisinPython, but for
simplicity we will use the easiest method, using the shift
operators, extracting msb from the embedding image and
placing it in the lsb of the image used as cover.
There could be an arguement the encoded image created in
the encoding process is not exactly the same as the original
image, but it is a good approximation (remember, we lost
color channel information in the process), but at the naked
eye viewers cannot tell there is a secret image hidden in the
same image.
The decoding processextractnowthehiddenimagefrom the
encoded image, the process is kind of the same but in the
opposite manner, as it is known the most significant bytes of
the secret image are embedded in the less significant bytes
of the encoded image, and then the lsb is just completed
with zeroes.
F. Results and Discussion
The Image to Image Encoder takes the secret and cover
images as input. We can specify the names of the images in
the code section. After running the Encoding file, the
encoded image file is created in the parent directory. When
running the decoding part, the decoded image also saved in
this directory.
This tool is very efficient in achieving the aim of the project,
that is to conceal the secret image inside the cover image
without any traces to the human eyes.Athirdpersonwill not
be able to find any change to the cover image. Even though
there are some minor flaws, we can achievemaximum result
if we take care of some guidelines while using this tool.
The image just be decoded/unhidden should be with the
same number of significant bits that were used to hide the
image. Otherwise, the data may contain more information
than originally encoded.
Both images must be the same size or the image being
hidden must be smaller. Otherwise all of the pixels won't fit
if the image you're hiding Is bigger than the image used to
hide.
When decoding there will be some loss of colors here and
there in the decoded image but considering this a slight loss
it can be neglected.
Figure 3: Secret Image
Figure 4: Cover Image
Figure 5: Encoded Image
Figure 6: Decoded Image
CONCLUSION
Now this project is developed in its very basic form. The
future work is to prevent or reduce the loss of colors while
decoding by improving the compression ratio of the
embedded image. This will add more secrecy and securityto
the data storage and transfer processes. Also using this
technique, we can work on hiding scannable codes like
barcodes or QR codes inside images so that instead of
decoding the hidden image, the encoded images can be
scanned to read/view the concealed image directly fromthe
cover image using specially software installed cameras or
scanners. All these future enhancements can open doors to
various possibilities and opportunities in the data security
field.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 372
There's a vast range of fields where this method or process
can be used for the secure transfer or communication of
data, in this case images. Also, in view of the flaws in the
techniques used currently for data security, this method
have a very good scope in the respective fields. Even though
this method also have its own limitations, considering the
advantages of this method, that all can be neglected. In
future we might see more situations and fields where this
method is implemented for secure data storageandtransfer.
ACKNOWLEDGEMENT
I should convey my real tendency and obligation to Dr M N
Nachappa and Asst. Prof: Dr Ganesh D and undertaking
facilitators for their effective steerage and consistent
inspirations all through my assessment work. Their ideal
bearing, absolute co-action and second discernment have
made my work gainful.
REFERENCES
[1] X. Zhou, W. Gong, W. Fu and L. Jin, "An improved
method for LSB based color image steganography
combined with cryptography," 2016 IEEE/ACIS 15th
International Conference on Computer and
Information Science (ICIS), 2016, pp. 1-4, doi:
10.1109/ICIS.2016.7550955.
[2] Aung Myint Aye "LSB Based Image Steganographyfor
Information Security System" Published in
International Journal of Trend in Scientific Research
and Development(ijtsrd),ISSN:2456-6470,Volume-3
| Issue-1, December 2018, pp.394-400
[3] Jiang, Nan & Zhao, Na & Wang, Luo.(2015).LSBBased
Quantum Image Steganography Algorithm.
International Journal of Theoretical Physics. 55.
10.1007/s10773-015-2640-0.
[4] J. V. Karthik and B. V. Reddy, “Authentication ofsecret
information in image stenography,” International
Journal of Computer Science and Network Security
(IJCSNS), vol. 14, no. 6, p. 58, 2014.
[5] Hassan, Fatuma Saeid and A. Gutub. “Novel
embedding secrecy within images utilizing an
improved interpolation-based reversible data hiding
scheme.” Journal of King Saud University - Computer
and Information Sciences (2020): n. pag.
[6] Bin Li et al., “A Survey on Image Steganography and
Steganalysis”, Journal of Info. Hiding and Multimedia
Signal Processing, ISSN 2073-4212, Vol-2, No-2,
pp142-172, Apr 21011.
[7] Saleh, Mohammed. (2018). Image Steganography
Techniques - A Review Paper. IJARCCE. 7. 52-58.
10.17148/IJARCCE.2018.7910
[8] J. K. Saini and H. K. Verma, “A hybrid approach for
image security by combining encryption and
steganography,” in Image Information Processing
(ICIIP), 2013 IEEE Second International Conference
on. IEEE, 2013, pp. 607–611.
[9] A. Cheddad et al.: “Digital image Steganography:
Survey and analysis of current methods”, Signal
Processing, Elsevier, 90(2010) 727-752.
[10] Neil F. Johnson: “Exploring Steganography:Seeingthe
Unseen”, George Mason University, IEEE Computer,
pp. 26-34, Feb 1998.
[11] S. Kurane, H. Harke, and S. Kulkarni, “TEXT AND
AUDIO DATA HIDING USING LSBANDDCTAREVIEW
APPROACH,” Natl. Conf. “Internet Things Towar. a
Smart Futur. “Recent Trends Electron. Commun.,
2016.
[12] Neeta, Deshpande & Kamalapur, Snehal & Jacobs,
Daisy. (2007). Implementation of LSB Steganography
and Its Evaluation for Various Bits. 173 - 178.
10.1109/ICDIM.2007.369349.
[13] A. E. Mustafa, A. M. F. Elgamal, M. E. Elalmi, and A. Bd,
“A Proposed Algorithm For Steganography In Digital
Image Based on Least Significant Bit,” Res. J. Specif.
Educ., no. 21, 2011.
[14] Viral Kishorbhai Patel, 2021, A Review Paper on
Cryptography, INTERNATIONAL JOURNAL OF
ENGINEERING RESEARCH & TECHNOLOGY (IJERT)
Volume 10, Issue 02 (February 2021)
[15] A. Singh and S. Malik, “Securing data by using
cryptography with steganography,” International
Journal of Advanced Research in Computer Science
and Software Engineering, vol. 3, no. 5, 2013.

More Related Content

What's hot

IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
ijtsrd
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
Ijetr042105
Ijetr042105Ijetr042105
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
Jishnu Grandhi
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
CSCJournals
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
IOSR Journals
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
Junus Sinuraya
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IOSR Journals
 
K0815660
K0815660K0815660
K0815660
IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

What's hot (19)

IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
K0815660
K0815660K0815660
K0815660
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Similar to Image to Image Encoder using Least Significant Bit

Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
ijtsrd
 
G0210032039
G0210032039G0210032039
G0210032039
researchinventy
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
review.pptx
review.pptxreview.pptx
review.pptx
TechNest1
 
G017444651
G017444651G017444651
G017444651
IOSR Journals
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
Ijetcas14 335
Ijetcas14 335Ijetcas14 335
Ijetcas14 335
Iasir Journals
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
Stegnography
StegnographyStegnography
Stegnography
keerthi505
 
F1803063236
F1803063236F1803063236
F1803063236
IOSR Journals
 
O017429398
O017429398O017429398
O017429398
IOSR Journals
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
Satyajit Debnath
 

Similar to Image to Image Encoder using Least Significant Bit (20)

Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
G0210032039
G0210032039G0210032039
G0210032039
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
review.pptx
review.pptxreview.pptx
review.pptx
 
G017444651
G017444651G017444651
G017444651
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Ijetcas14 335
Ijetcas14 335Ijetcas14 335
Ijetcas14 335
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Stegnography
StegnographyStegnography
Stegnography
 
F1803063236
F1803063236F1803063236
F1803063236
 
O017429398
O017429398O017429398
O017429398
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 

More from YogeshIJTSRD

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
YogeshIJTSRD
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
YogeshIJTSRD
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
YogeshIJTSRD
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
YogeshIJTSRD
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
YogeshIJTSRD
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
YogeshIJTSRD
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
YogeshIJTSRD
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
YogeshIJTSRD
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
YogeshIJTSRD
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
YogeshIJTSRD
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
YogeshIJTSRD
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
YogeshIJTSRD
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
YogeshIJTSRD
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
YogeshIJTSRD
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
YogeshIJTSRD
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
YogeshIJTSRD
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
YogeshIJTSRD
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
YogeshIJTSRD
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
YogeshIJTSRD
 

More from YogeshIJTSRD (20)

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
 

Recently uploaded

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Image to Image Encoder using Least Significant Bit

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 369 Image to Image Encoder using Least Significant Bit Samthomas Raphael1, Dr. Ganesh D2 1Master of Computer Application, 2Associate Professor, 1,2Jain Deemed-to-be University, Bengaluru, Karnataka, India ABSTRACT The purpose of “Image to Image Encoder” is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression.LeastSignificant BitEmbeddings(LSB) are the general steganographic procedure that might be utilized to install information into a variety of digital media, the most studied applications are utilizing LSB embedding to hide one picture inside another. The security to keep up secrecy of message is accomplished by making it infeasible for a third individual to distinguish and recover the secret message. This method can be used in various fields for data security like for secret communication and data transfer via networks, for storing and transferring sensitive data and information in the defense sector. As the normal viewers can not identify the slight difference in the encoded image without the reference of the original cover image, this method ensures more securitythan cryptographic methods. KEYWORDS: Digital Image, Secret Image, Cover, Steganography, Encoding, Decoding, Data Security How to cite this paper: Samthomas Raphael | Dr. Ganesh D "Image to Image Encoder using Least Significant Bit" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-5 | Issue-4, June 2021, pp.369-372, URL: www.ijtsrd.com/papers/ijtsrd41253.pdf Copyright © 2021 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION Data security has developed asa major issue inouradvanced life. The advancementofnewtransmissionmethodspowersa particular strategy ofsafety mechanisms particularlyinstate of the communication of data or information. As the size of data transmission across internet increases, the significance of information security also increases. When these transferred data are valuable or confidential, intruders or attackers try to expose, alter or destroy it or use it for more difficult attacks. This is where the importance of data protection arises. There are several techniques used for ensuring personal or private communication of data. While talking about data, images take a lion’s share in the data that is shared through the internet.Mostofthetimestheseimages are of great importance to the people who send or receive it. It can be personal photographs, confidental images etc. This is in the case of normal people. When it comes to the data communication between organisations or governments or agencies related to them, these images might be of much more importance that can cause dangerous threats when it falls on intruders hands. So its crucial to prevent or avoid attacks or actions to access these data while transferring them. This project uses steganographic techniquestohidean image inside another imagesothattheimageinsidethecover image will be safe from the attackers eyes. These encoded images can be transferred through internet without the fear of data thefts since the attackers are unaware of the secret image inside it. METHODOLOGIES A. Least Significant Bit (LSB) Algorithm The well-known strategy usedforsteganographyistheLeast Significant Bit. And additionally the prominenttechniquefor the present day, steganography is to utilize LSB of picture‘s pixel data. This investigation is utilized for one piece of the LSB. It inserts each piece of the double content piece with one piece of every pixel in the first picture. This strategy works when the record is longerthanthemessagedocument and if picture is grayscale, when applying LSB strategies to every byte of a 24 bit picture, three bits can be encoded into every pixel. Example: We can hide data in images by replacing the last bit of every color‘s byte with a bit from the secret image. B. Existing System There are several encoding techniques that are oftenusedin day-today functions to ensure data security. Most of them are using cryptographic techniques. But when using cryptography, the data is visible or available to trespassers who see the data or intruders who tries to access the protected data even though it is in the encrypted format. If they have the right tools to decrypt it, they can break the security easily and decrypt and fetch the protected data. It means that one way or another, an intruder can figure out the presence of the hidden data which results in the compromise of sensitive data. IJTSRD41253
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 370 C. Proposed System In this method, we are using steganographic technique instead of cryptography. In this method, the intruders or trespassers cannot know about the presence of the image which is hidden inside the cover image. Without a referenceoftheoriginal cover image it is impossible to find the presence of the secret image inside the encoded image. So this method ensures more data security to the users in data hiding for storage and transfer. Figure 1: General Process Diagram D. Steganography vs Cryptography Cryptography is the method used for the conversion of the data into encrypted format by using the symmetric key and this process is known as the encryption. The primary drawback of the cryptography approach is that the encrypted data is visible but we can’t read it. Steganography is the method for data embedding where the data to be kept secret is concealed into the digital media .In this process the Trespasser can’t be able to see the plaintext or the cipher text because itisconcealingintothe another media. The trespasser can’t suspect if thereis any confidential data that is existing. The steganography technique is used for the better security of the data over the computer networks. E. Process An image is represented as a set of pixels and each pixel in an image is represented by a coordinate(x,y)witha color, andthese colors are represented with a tuple with the intensity of three RGB colors (red,green, blue).EachoftheseRGBcolorsgoesfrom the range of 0 to 255 and we can represent that number as a 8 digit binary number, for example, 192_{10} = 1100 0000_{2}19210=110000002. Now, the most significant bits in that number are 11001100 and the rest (00000000) does not contribute that much value to the information, so these bits are called least significant bits . Let’s consider Pillow. Pillow is a friendly fork of of Python Imaging Library, it is very effortless to use and it supports many image file formats and operations. This can be extended to support even diffrentfileformats.UsingPillowasa virtual canvasto draw using pixels is easy. An existing image can be read and get not only image but information regarding pixels also. In this case we want to conceal that secret image inside the covering image. Here is the idea of LSB and MSB comes in to application. The concept is extracting the MSB from the image to hide and replace it with the Least Significant Bit of the cover up image.At the end we should generate an image almost identical to the cover but hiding the secret image. As mentioned before, the idea is very simple, we take the image we want to hide and read the color channel information for a given pixel, let’s say, pixel (312, 216) has color information (53, 31, 109). Now, we read the same color info from the image we will use as cover up, (181, 200, 220). Then comes the most important and interesting part, we take the color info one by one, convert them into binary, 181_{10} = 1011 0101_218110=101101012 for the cover image pixel of the red channel (312, 216) and 53_{10} = 0011 0101_25310=001101012 for the pixel in the same embedding image, andwetake4bytesmost significant bits from the embedding image and place them instead of the 4 bytes least significant bits of the covering image (cover up), resulting 1011 0011_2 = 179_{10}101100112=17910 for the same pixel, notice even in decimal there is no much distance or difference between the original color channel for red (181_{10}18110) and the resulting secret (179_{10}17910), we repeatedly perform this process for every pixel of the image and color channel. Figure 2: Work Flow
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 371 There are number methods to performthisinPython, but for simplicity we will use the easiest method, using the shift operators, extracting msb from the embedding image and placing it in the lsb of the image used as cover. There could be an arguement the encoded image created in the encoding process is not exactly the same as the original image, but it is a good approximation (remember, we lost color channel information in the process), but at the naked eye viewers cannot tell there is a secret image hidden in the same image. The decoding processextractnowthehiddenimagefrom the encoded image, the process is kind of the same but in the opposite manner, as it is known the most significant bytes of the secret image are embedded in the less significant bytes of the encoded image, and then the lsb is just completed with zeroes. F. Results and Discussion The Image to Image Encoder takes the secret and cover images as input. We can specify the names of the images in the code section. After running the Encoding file, the encoded image file is created in the parent directory. When running the decoding part, the decoded image also saved in this directory. This tool is very efficient in achieving the aim of the project, that is to conceal the secret image inside the cover image without any traces to the human eyes.Athirdpersonwill not be able to find any change to the cover image. Even though there are some minor flaws, we can achievemaximum result if we take care of some guidelines while using this tool. The image just be decoded/unhidden should be with the same number of significant bits that were used to hide the image. Otherwise, the data may contain more information than originally encoded. Both images must be the same size or the image being hidden must be smaller. Otherwise all of the pixels won't fit if the image you're hiding Is bigger than the image used to hide. When decoding there will be some loss of colors here and there in the decoded image but considering this a slight loss it can be neglected. Figure 3: Secret Image Figure 4: Cover Image Figure 5: Encoded Image Figure 6: Decoded Image CONCLUSION Now this project is developed in its very basic form. The future work is to prevent or reduce the loss of colors while decoding by improving the compression ratio of the embedded image. This will add more secrecy and securityto the data storage and transfer processes. Also using this technique, we can work on hiding scannable codes like barcodes or QR codes inside images so that instead of decoding the hidden image, the encoded images can be scanned to read/view the concealed image directly fromthe cover image using specially software installed cameras or scanners. All these future enhancements can open doors to various possibilities and opportunities in the data security field.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41253 | Volume – 5 | Issue – 4 | May-June 2021 Page 372 There's a vast range of fields where this method or process can be used for the secure transfer or communication of data, in this case images. Also, in view of the flaws in the techniques used currently for data security, this method have a very good scope in the respective fields. Even though this method also have its own limitations, considering the advantages of this method, that all can be neglected. In future we might see more situations and fields where this method is implemented for secure data storageandtransfer. ACKNOWLEDGEMENT I should convey my real tendency and obligation to Dr M N Nachappa and Asst. Prof: Dr Ganesh D and undertaking facilitators for their effective steerage and consistent inspirations all through my assessment work. Their ideal bearing, absolute co-action and second discernment have made my work gainful. REFERENCES [1] X. Zhou, W. Gong, W. Fu and L. Jin, "An improved method for LSB based color image steganography combined with cryptography," 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), 2016, pp. 1-4, doi: 10.1109/ICIS.2016.7550955. [2] Aung Myint Aye "LSB Based Image Steganographyfor Information Security System" Published in International Journal of Trend in Scientific Research and Development(ijtsrd),ISSN:2456-6470,Volume-3 | Issue-1, December 2018, pp.394-400 [3] Jiang, Nan & Zhao, Na & Wang, Luo.(2015).LSBBased Quantum Image Steganography Algorithm. International Journal of Theoretical Physics. 55. 10.1007/s10773-015-2640-0. [4] J. V. Karthik and B. V. Reddy, “Authentication ofsecret information in image stenography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 14, no. 6, p. 58, 2014. [5] Hassan, Fatuma Saeid and A. Gutub. “Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme.” Journal of King Saud University - Computer and Information Sciences (2020): n. pag. [6] Bin Li et al., “A Survey on Image Steganography and Steganalysis”, Journal of Info. Hiding and Multimedia Signal Processing, ISSN 2073-4212, Vol-2, No-2, pp142-172, Apr 21011. [7] Saleh, Mohammed. (2018). Image Steganography Techniques - A Review Paper. IJARCCE. 7. 52-58. 10.17148/IJARCCE.2018.7910 [8] J. K. Saini and H. K. Verma, “A hybrid approach for image security by combining encryption and steganography,” in Image Information Processing (ICIIP), 2013 IEEE Second International Conference on. IEEE, 2013, pp. 607–611. [9] A. Cheddad et al.: “Digital image Steganography: Survey and analysis of current methods”, Signal Processing, Elsevier, 90(2010) 727-752. [10] Neil F. Johnson: “Exploring Steganography:Seeingthe Unseen”, George Mason University, IEEE Computer, pp. 26-34, Feb 1998. [11] S. Kurane, H. Harke, and S. Kulkarni, “TEXT AND AUDIO DATA HIDING USING LSBANDDCTAREVIEW APPROACH,” Natl. Conf. “Internet Things Towar. a Smart Futur. “Recent Trends Electron. Commun., 2016. [12] Neeta, Deshpande & Kamalapur, Snehal & Jacobs, Daisy. (2007). Implementation of LSB Steganography and Its Evaluation for Various Bits. 173 - 178. 10.1109/ICDIM.2007.369349. [13] A. E. Mustafa, A. M. F. Elgamal, M. E. Elalmi, and A. Bd, “A Proposed Algorithm For Steganography In Digital Image Based on Least Significant Bit,” Res. J. Specif. Educ., no. 21, 2011. [14] Viral Kishorbhai Patel, 2021, A Review Paper on Cryptography, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 10, Issue 02 (February 2021) [15] A. Singh and S. Malik, “Securing data by using cryptography with steganography,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, 2013.