SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1100
Impact of Message Size on Least Significant Bit and
Chaotic Logistic Mapping Steganographic Technique
Tokey Ahmmed1, Ipshita Tasnim Raha1, Faizah Safwat2, Nakib Aman Turzo1
1Lecturer,
1,2Department of Computer Science & Engineering, Varendra University, Rajshahi, Bangladesh
ABSTRACT
Steganography is the technique of hiding information in other objects.
Although many carrier objects can be used, digital images are the most
popular because of their usage over the internet. For this purpose,manytypes
of images steganographic techniques have been invented. Each of them has
both pros and cons. It depends on the complexity, hiding capacity, security,
and so on. In our research, we studied the two most popular techniques of
image steganography, least significant bit (LSB) and chaotic logistic mapping
to find the similarities, dissimilarities, and many other factors. In this paper,
we presented a detailed comparison of the LSB and chaotic logistic mapping-
based image steganography for various carrier images and messages.
KEYWORDS: image steganography, cover image, various steganographic
technique, hidden message, invisible communication, communicated message,
steganography overview, multimedia content, least significant bit (LSB), chaotic
logistic mapping (chaotic LM).
How to cite this paper: Tokey Ahmmed |
Ipshita Tasnim Raha | Faizah Safwat |
Nakib Aman Turzo "Impact of Message
Size on Least Significant Bit and Chaotic
Logistic Mapping Steganographic
Technique"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-4,
June 2021, pp.1100-1104, URL:
www.ijtsrd.com/papers/ijtsrd42494.pdf
Copyright © 2021 by author (s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION:
Security of information is one of the most important factors
of information and communication technology.
Cryptography is associated with the process of securing
secret communicationinpresenceofadversariestomaintain
information security such as data confidentiality, data
integrity, authentication etc.
But the cryptography method is not suitable for hiding
information where the user wants to avoid unwanted
attention. This is where the steganography comes in to the
role.
It is an important branch of information hiding. In the
present year steganography is gaining attraction because
sometimes hiding the contents of a message for secrecy
might not be enough. it may also be necessary to hide the
existence of the secret message due to the security issues
over the internet.
cryptography and Steganography differ in the sense that
where cryptography keeps the contents of a message secret,
steganography focuses onkeepingthe presenceofa message
secret [1].
Steganography is best known for the techniques of hiding
messages or information. The main benefit of this is, it also
hides the existence of the communication which cannot be
recognized by human vision. Such techniques are
accomplished in a way that secret contents are hidden in a
carrier file like image for hiding its presence without a
distortion in a carrier. Hence covering up thepresenceofthe
communicated message or information.
Depending on the nature of the hidden information
(embedded information), steganography can be divided
mainly into four types: Text Steganography. Image
Steganography, Video Steganography, AudioSteganography
[2]
Fig 1: Types of Steganography
But we will mainly focus on the various techniques of image
Steganography. As the name suggests, Image Steganography
is a process of hiding secret message within an image file.
Steganography has recently become an important image
working tool because it provides a powerful security,
especially when it is joined with digital images due to the
inability of the human eye to focus on the sensitive details of
photos. A little change in the steganography of an image has
IJTSRD42494
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1101
no tangible effect on the image. So, image steganography can
be used to hide unnatural secret messages within a carrier
image, so the carrier image quality will have a small change,
thus unrecognizable by human vision.
Image steganography techniques are classified in twoprime
kinds, spatial domain and frequency domain (transform)
Image Steganography model consists of a secret message,
cover image, stego message, secret key and embedding
algorithm.
Cover Image (C): It is the carrier of secret message thatacts
as a medium in which any secret message is embedded. As a
result, the existence of the sent secret message stayshidden.
Some embedding algorithms are used to embed/hide the
secret message into the cover.
Stego Image (S): the image obtained after steganography is
called the stego image. Stego image must not distort cover
image quality. So maintaining the stego image quality is
important.
Secret Key (K): it is used to encode/decode the embedded
secret message.
Secret Message (M): A secret message can be any kind of
data, like, text or image etc., It is covered within coverimage.
[3]
Steganography process basically consists of encoding at the
sender end to obtain the Stego-Image and decoding at the
receiver end to provide the secretorprivateinformation. the
secret message is encrypted using an encryption key in
encoding step. On the other hand, the decoder uses a
decryption algorithm on the received stegoimagetodecrypt
it and provide output in decoding step.
While there are several imagesteganographytechniques,we
will be focusing on the 2 most common technique LSB and
Logistic Mapping.
LSB is one of the most well-known algorithms in this field. It
is also very efficient algorithm used to embed the
information in a cover file. This is method for embedding
data into cover image. The least significant bit of each pixel
of an image is altered to a bit of a message that is to be
hidden [2]. The change is undetectable bythehumaneyebut
still can be recognized by some statistical tests [7].
In a simple Least significant bit (LSB) insertion method
information bits are embedded in [14]intheleastsignificant
bit (in other word, the 8th bit) of a cover image. In this case
some or all of the bytes inside an image is changed to a bit of
the secret message. This method can be used in both
grayscale or RGB colored image. When using a 24-bit image
RGB image, a bit of each of the red, green and blue
components can be used for the LSB bit. In that case, onecan
store 3 bits in each pixel.
An 800 × 600 pixel image, can thus store a total amount of
1,440,000 bits or 180,000 bytes of embedded data [1].
The given figure shows the pixel values of RGB cover image.
After embedding a secret data 200 in a binary form which is
11001000, into the least significant bits of the image, the
stego image became this:
(a)
(b)
Fig 2: (a) Pixel values of RGB cover image (b) Pixel
values after embedding secret data using LSB
algorithm.
Logistic map is also one of the well-known techniqueswhich
used in many data hiding methods. In image steganography
the popularity of this technique increased because of its
chaotic nature. This technique is very simple and fast.
Mathematically, the logistic map can be written as [8],
Though it is simple and fast but the downfall is it has short
key space [5]. The main purpose of using chaotic logistic
mapping is sensitivity to initial conditions and very small
changes in the input can cause large changes in the output
[5].
LITERATURE REVIEW
In paper written by K.Thangadurai and G.Sudha Devi used
various types of LSB techniques in spatial domain. The LSB
method is widely used for its simplicity in image
steganography. In this approach, the least significant bit
(LSB) value of each pixel is exploited. The paper also shows
the operations involving thereplacementofpixel’sLSBvalue
of cover image. The method may achieve high capacity, but
still susceptible to sensitive image manipulation such as
compression and cropping of images.[2]
In 2018 Mohammed Mahdi Hashim, Mohd Shafry Mohd
Rahim, Fadil Abass Johi, Mustafa Sabah Taha and Hassan
Salman Hamad published a paper [3] which evaluated the
performance of LSB based image steganography on various
formats such as BMP, GIF, PNG and JPEG. Based on the
reading, the JEPG format tends to have a balanced result
considering both security and payload capacity. Whereas,
GIF and PNG both were moderate in payload capacity but
performed low in security. Ontheotherhand,BMPfileimage
had a high payload capacity but still showed low security
performance.[3]
Another significant effort made By Stuti Goel, Arun Rana &
Manpreet Kaur in the year 2013, they compared few image
steganography techniques in both spatial and frequency
domain. A comparison of least significant bit (LSB), Discrete
Cosine Transform (DCT) and Discrete Wavelet Transform
(DWT) based steganography has been shown. Where LSB is
implement in spatial domain and DCT, DWT was
implemented in frequency domain. The payload capacity of
LSB in this paper was also high comparing to the DCT, DWT.
The invisibility of LSB was low, whereas it was high in both
DCT, DWT. The PSNR and MSE value was found average in
LSB, meaning there was medium distortion of the stego-
image.[4]
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1102
In 2017 Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari
Barani proposed a new transformation domain
steganography on chaotic based logistic mapping. The
experiment showed high capability of hiding information in
any type of images. In this technique they used integer
wavelet transformation before embedding the message into
the cover image. After that an inverse integer wavelet
transformation has been done to get the stego-image. Based
on the result the proposed technique was claimed to be
better than previous algorithm.[5]
METHOLODOGY
In this method we compared LSB and chaotic logistic
mapping technique for image steganography. The
comparison was based on the image invisibility (using MSE,
SNR, PSNR) and embedding time of the techniques. As cover
image for our work, we have used data 3 popular images
(Peppers, Tulips, Baboon). The details are given below –
Table I: Property of selected images
As the secret message we have used 2 strings of
alphanumeric characters. For the first experiment 11-
character message “Hello world” was used. The message
was encoded in 3 separate images (Peppers,Tulips,Baboon)
using both LSB and Chaotic Logistic Mapping based image
steganography method.
Table II: Summary of secret messages
In the second experiment a 43-character message “A quick
brown fox jumps over the lazy dog” was used. We also
embedded the message in 3 separate images (Peppers,
Tulips, Baboon) using both LSB and Chaotic Logistic
Mapping based image steganography method.
In LSB method the cover image was first converted into
grayscale. Then it was embedded with the secret messages
into the 8th bit of the LSB of the image. In chaotic logistic
mapping method, the secret message was embedded in the
RGB image.
Each image steganography technique has different strong
and weak points and it is important to select the most
suitable algorithm for an application. All steganographic
algorithms have to comply with a few basic requirements.
These requirements are as follows:
A. MSE: The mean-squared error (MSE) used to compare
image compression quality. The MSE represents the
cumulative squared error between the compressed and
the original image. MSE between two images I1 (m,n)
and I2(m,n) is [4]:
M and N are the number of rows and columns in the input
images, respectively.
B. PSNR: whereas peak signal-to-noise ratio (PSNR)isalso
used for comparing image compression quality. It
represents a measure of the peak error. The lower the
value of MSE, the lower the error [6]
C. Payload capacity: the maximum size of a message that
can be embedded in a cover image is called Payload
capacity. usually, it is measured using bits per pixel
(bpp) or bits per byte (bpb) [1].
D. Invisibility: The invisibility of a steganographic
algorithm is the ability to be unnoticed by the human
eye. The algorithm considered to be compromised no
one can see that an image has been tampered with [1].
Fig 3: Dataflow diagram of proposed methodology.
EXPERIMENTAL RESULTS AND PERFORMANE ANALYSIS
Steganography algorithm should fulfill everyrequirementto
be perfect. Unfortunately, the algorithms evaluated here
don’t satisfy all the requirements. So, a trade-off is required
for specific application. In Table III a generic comparison of
performance factor is depicted.
For the experiment at first the message “Hello world” is
hidden using the previously stated images and LSB and
chaotic mapping is implemented on them. The result of the
required time, MSE, SNR and PSNR values are calculated.
Then the same values are calculated for the same imagesbut
this time for a different message.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1103
Table III: Comparison of Performance factors
Fig 4: Required time in seconds for message size of 11.
From figure 4 and 5 it is clearly observedthatchaoticlogistic
mapping. takes much higher time than LSB. In case of single
image processing’sperspectivechaoticlogisticmappingtook
more time for high resolution images in case of 11 character
message. For 43 character message required time is almost
identical for both LSB and chaotic logistic mapping.
Fig 5: Required time in seconds for message size of 43.
Now from individual algorithm’s perspective MSE value can
be seen increasing rapidly with message sizeincreaseinLSB
algorithm as shown in figure 6. While for the same images
and message size very low increment is in MSE values are
seen for chaotic logistic mapping.
Fig 6: Comparison of LSB MSE values for message size
of 11 and 43.
Fig 7: Comparison of Chaotic LM MSE values for
message size of 11 and 43.
From figure 7 and 8 relative comparison of PSNR value can
be seen for both LSB and Chaotic LM. For LSB increase in
message size results in increasing noise between stego-
image and original image. 43 character message almost
resulted in 2 times multiplied noise for LSB.
Fig 8: Comparison of LSB PSNR values for message size
of 11 and 43.
While noise is almost similar in case of Chaotic LM for
increasing message size. So according to the findings it can
be evidently said that Chaotic Logistic Mapping is more
scalable with respect to LSB in case of steganographic
purposes. It is also observed that although generic
implementation of Chaotic Logistic Mapping requires more
time than LSB but impact of message size is also very little
for the previous one.
Fig 9: Comparison of Chaotic LM PSNR values for
message size of 11 and 43.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1104
Table IV: Summary of Time, MSE, SNR and PSNR values
for message size of 11.
An overview of all findings is depicted in tableIVandtable V.
For clearance respected SNR values are also included with
required Time, MSE and PSNR values for each image and
respective message size.
Table V: Summary of Time, MSE, SNR and PSNR values
for message size of 43.
Since, the larger the value of PSNR, the more similarity
between the hidden image and the cover image [6]. From
this experimental resultstego-imageinLSBhasmoreremain
more similar to the cover image.
CONCLUSION
In this paper, two of the major image steganography
techniques have been discussed. Although both techniques
have structural differences, based on our experiments, we
have found that chaotic logistic mapping is more suitable
when the message size is larger. It provides better security
for the secret message. On the other hand, the least
significant bit (LSB) is more suitable when a short message
needs to be embedded on the cover image. The LSB is the
better choice if we want to embed the message in a short
amount of time since the embedding time in LSB is
significantly less the chaotic logistic mapping. Impact of
significant increase or decrease of message size on Chaotic
Logistic Mapping and Least Significant Bit should be further
explored to find the tolerance limit. The above findings can
also help to predict the number of cover images requiredfor
sending a specific messagebasedonselectedsteganographic
technique. Optimal algorithm can also help sending bigger
messages using lowest number of cover images.
REFERENCES
[1] Morkel, T., J. Eloff and M. Olivier. “An overview of
image steganography, Proceedings of the ISSA 2005
New Knowledge Today Conference,” 2005, pp. 1-11.
[2] K. Thangadurai and G. Sudha Devi, "AnanalysisofLSB
based image steganography techniques, 2014
International Conference on Computer
Communication and Informatics,” 2014, pp. 1-4, doi:
10.1109/ICCCI.2014.6921751.
[3] Mohammed Mahdi Hashim, Mohd Shafry Mohd
Rahim, Fadil Abass Johi, Mustafa Sabah Taha, Hassan
Salman Hamad, “Performance evaluation
measurement of image steganography techniques
with analysis of LSB based on variation image
formats, International Journal of Engineering and
Technology,” Volume 7, Issue 4, 2018, pp.3506-3514,
doi:10.14419/ijet.v7i4.17294.
[4] Goel, Stuti. (2013), “A Review of Comparison
Techniques of Image Steganography, IOSR Journal of
Electrical and Electronics Engineering,” Volume 13,
Issue 4, 2013, pp. 41-48, ISSN 2214-2126, pp. 41-48.
10.9790/1676-0614148.
[5] Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari
Barani, “A new transform domain steganography
based on modified logistic chaotic map for color
images, Journal of Information Security and
Applications,” Volume 34, Part 2, 2017, pp. 142-151,
ISSN 2214-2126, doi:10.1016/j.jisa.2017.04.004.
[6] X. Zhou, W. Gong, W. Fu and L. Jin, "An improved
method for LSB based color image steganography
combined with cryptography, 2016 IEEE/ACIS 15th
International Conference on Computer and
Information Science (ICIS),” 2016, pp. 1-4, doi:
10.1109/ICIS.2016.7550955.
[7] Xia, Zhihua & Wang, Xinhui & Xingming, Sun & Wang,
Baowei. (2014). Steganalysis of least significant bit
matching using multiorder differences. Security and
Communication Networks. 7. 10.1002/sec.864.
[8] Mandal, M., Nandi, D., Banik, G., & Chattopadhyay, D.
(2012). An image encryption process based on
Chaotic logistic map. IETE Technical Review, 29(5),
395. doi:10.4103/0256-4602.103173

More Related Content

What's hot

Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
Abhishek Dhara
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
CSCJournals
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
Junus Sinuraya
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
K0815660
K0815660K0815660
K0815660
IOSR Journals
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ijcsit
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 

What's hot (18)

Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
K0815660
K0815660K0815660
K0815660
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 

Similar to Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
IRJET- Image Processing using Steganography
IRJET-  	  Image Processing using SteganographyIRJET-  	  Image Processing using Steganography
IRJET- Image Processing using Steganography
IRJET Journal
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
ijtsrd
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
ijtsrd
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 
G017444651
G017444651G017444651
G017444651
IOSR Journals
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
IJARIIE JOURNAL
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
O017429398
O017429398O017429398
O017429398
IOSR Journals
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Stegnography
StegnographyStegnography
Stegnography
keerthi505
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
ijtsrd
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 

Similar to Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique (20)

Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
IRJET- Image Processing using Steganography
IRJET-  	  Image Processing using SteganographyIRJET-  	  Image Processing using Steganography
IRJET- Image Processing using Steganography
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
G017444651
G017444651G017444651
G017444651
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
O017429398
O017429398O017429398
O017429398
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
Stegnography
StegnographyStegnography
Stegnography
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1100 Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique Tokey Ahmmed1, Ipshita Tasnim Raha1, Faizah Safwat2, Nakib Aman Turzo1 1Lecturer, 1,2Department of Computer Science & Engineering, Varendra University, Rajshahi, Bangladesh ABSTRACT Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose,manytypes of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit (LSB) and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping- based image steganography for various carrier images and messages. KEYWORDS: image steganography, cover image, various steganographic technique, hidden message, invisible communication, communicated message, steganography overview, multimedia content, least significant bit (LSB), chaotic logistic mapping (chaotic LM). How to cite this paper: Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4, June 2021, pp.1100-1104, URL: www.ijtsrd.com/papers/ijtsrd42494.pdf Copyright © 2021 by author (s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION: Security of information is one of the most important factors of information and communication technology. Cryptography is associated with the process of securing secret communicationinpresenceofadversariestomaintain information security such as data confidentiality, data integrity, authentication etc. But the cryptography method is not suitable for hiding information where the user wants to avoid unwanted attention. This is where the steganography comes in to the role. It is an important branch of information hiding. In the present year steganography is gaining attraction because sometimes hiding the contents of a message for secrecy might not be enough. it may also be necessary to hide the existence of the secret message due to the security issues over the internet. cryptography and Steganography differ in the sense that where cryptography keeps the contents of a message secret, steganography focuses onkeepingthe presenceofa message secret [1]. Steganography is best known for the techniques of hiding messages or information. The main benefit of this is, it also hides the existence of the communication which cannot be recognized by human vision. Such techniques are accomplished in a way that secret contents are hidden in a carrier file like image for hiding its presence without a distortion in a carrier. Hence covering up thepresenceofthe communicated message or information. Depending on the nature of the hidden information (embedded information), steganography can be divided mainly into four types: Text Steganography. Image Steganography, Video Steganography, AudioSteganography [2] Fig 1: Types of Steganography But we will mainly focus on the various techniques of image Steganography. As the name suggests, Image Steganography is a process of hiding secret message within an image file. Steganography has recently become an important image working tool because it provides a powerful security, especially when it is joined with digital images due to the inability of the human eye to focus on the sensitive details of photos. A little change in the steganography of an image has IJTSRD42494
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1101 no tangible effect on the image. So, image steganography can be used to hide unnatural secret messages within a carrier image, so the carrier image quality will have a small change, thus unrecognizable by human vision. Image steganography techniques are classified in twoprime kinds, spatial domain and frequency domain (transform) Image Steganography model consists of a secret message, cover image, stego message, secret key and embedding algorithm. Cover Image (C): It is the carrier of secret message thatacts as a medium in which any secret message is embedded. As a result, the existence of the sent secret message stayshidden. Some embedding algorithms are used to embed/hide the secret message into the cover. Stego Image (S): the image obtained after steganography is called the stego image. Stego image must not distort cover image quality. So maintaining the stego image quality is important. Secret Key (K): it is used to encode/decode the embedded secret message. Secret Message (M): A secret message can be any kind of data, like, text or image etc., It is covered within coverimage. [3] Steganography process basically consists of encoding at the sender end to obtain the Stego-Image and decoding at the receiver end to provide the secretorprivateinformation. the secret message is encrypted using an encryption key in encoding step. On the other hand, the decoder uses a decryption algorithm on the received stegoimagetodecrypt it and provide output in decoding step. While there are several imagesteganographytechniques,we will be focusing on the 2 most common technique LSB and Logistic Mapping. LSB is one of the most well-known algorithms in this field. It is also very efficient algorithm used to embed the information in a cover file. This is method for embedding data into cover image. The least significant bit of each pixel of an image is altered to a bit of a message that is to be hidden [2]. The change is undetectable bythehumaneyebut still can be recognized by some statistical tests [7]. In a simple Least significant bit (LSB) insertion method information bits are embedded in [14]intheleastsignificant bit (in other word, the 8th bit) of a cover image. In this case some or all of the bytes inside an image is changed to a bit of the secret message. This method can be used in both grayscale or RGB colored image. When using a 24-bit image RGB image, a bit of each of the red, green and blue components can be used for the LSB bit. In that case, onecan store 3 bits in each pixel. An 800 × 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data [1]. The given figure shows the pixel values of RGB cover image. After embedding a secret data 200 in a binary form which is 11001000, into the least significant bits of the image, the stego image became this: (a) (b) Fig 2: (a) Pixel values of RGB cover image (b) Pixel values after embedding secret data using LSB algorithm. Logistic map is also one of the well-known techniqueswhich used in many data hiding methods. In image steganography the popularity of this technique increased because of its chaotic nature. This technique is very simple and fast. Mathematically, the logistic map can be written as [8], Though it is simple and fast but the downfall is it has short key space [5]. The main purpose of using chaotic logistic mapping is sensitivity to initial conditions and very small changes in the input can cause large changes in the output [5]. LITERATURE REVIEW In paper written by K.Thangadurai and G.Sudha Devi used various types of LSB techniques in spatial domain. The LSB method is widely used for its simplicity in image steganography. In this approach, the least significant bit (LSB) value of each pixel is exploited. The paper also shows the operations involving thereplacementofpixel’sLSBvalue of cover image. The method may achieve high capacity, but still susceptible to sensitive image manipulation such as compression and cropping of images.[2] In 2018 Mohammed Mahdi Hashim, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha and Hassan Salman Hamad published a paper [3] which evaluated the performance of LSB based image steganography on various formats such as BMP, GIF, PNG and JPEG. Based on the reading, the JEPG format tends to have a balanced result considering both security and payload capacity. Whereas, GIF and PNG both were moderate in payload capacity but performed low in security. Ontheotherhand,BMPfileimage had a high payload capacity but still showed low security performance.[3] Another significant effort made By Stuti Goel, Arun Rana & Manpreet Kaur in the year 2013, they compared few image steganography techniques in both spatial and frequency domain. A comparison of least significant bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) based steganography has been shown. Where LSB is implement in spatial domain and DCT, DWT was implemented in frequency domain. The payload capacity of LSB in this paper was also high comparing to the DCT, DWT. The invisibility of LSB was low, whereas it was high in both DCT, DWT. The PSNR and MSE value was found average in LSB, meaning there was medium distortion of the stego- image.[4]
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1102 In 2017 Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani proposed a new transformation domain steganography on chaotic based logistic mapping. The experiment showed high capability of hiding information in any type of images. In this technique they used integer wavelet transformation before embedding the message into the cover image. After that an inverse integer wavelet transformation has been done to get the stego-image. Based on the result the proposed technique was claimed to be better than previous algorithm.[5] METHOLODOGY In this method we compared LSB and chaotic logistic mapping technique for image steganography. The comparison was based on the image invisibility (using MSE, SNR, PSNR) and embedding time of the techniques. As cover image for our work, we have used data 3 popular images (Peppers, Tulips, Baboon). The details are given below – Table I: Property of selected images As the secret message we have used 2 strings of alphanumeric characters. For the first experiment 11- character message “Hello world” was used. The message was encoded in 3 separate images (Peppers,Tulips,Baboon) using both LSB and Chaotic Logistic Mapping based image steganography method. Table II: Summary of secret messages In the second experiment a 43-character message “A quick brown fox jumps over the lazy dog” was used. We also embedded the message in 3 separate images (Peppers, Tulips, Baboon) using both LSB and Chaotic Logistic Mapping based image steganography method. In LSB method the cover image was first converted into grayscale. Then it was embedded with the secret messages into the 8th bit of the LSB of the image. In chaotic logistic mapping method, the secret message was embedded in the RGB image. Each image steganography technique has different strong and weak points and it is important to select the most suitable algorithm for an application. All steganographic algorithms have to comply with a few basic requirements. These requirements are as follows: A. MSE: The mean-squared error (MSE) used to compare image compression quality. The MSE represents the cumulative squared error between the compressed and the original image. MSE between two images I1 (m,n) and I2(m,n) is [4]: M and N are the number of rows and columns in the input images, respectively. B. PSNR: whereas peak signal-to-noise ratio (PSNR)isalso used for comparing image compression quality. It represents a measure of the peak error. The lower the value of MSE, the lower the error [6] C. Payload capacity: the maximum size of a message that can be embedded in a cover image is called Payload capacity. usually, it is measured using bits per pixel (bpp) or bits per byte (bpb) [1]. D. Invisibility: The invisibility of a steganographic algorithm is the ability to be unnoticed by the human eye. The algorithm considered to be compromised no one can see that an image has been tampered with [1]. Fig 3: Dataflow diagram of proposed methodology. EXPERIMENTAL RESULTS AND PERFORMANE ANALYSIS Steganography algorithm should fulfill everyrequirementto be perfect. Unfortunately, the algorithms evaluated here don’t satisfy all the requirements. So, a trade-off is required for specific application. In Table III a generic comparison of performance factor is depicted. For the experiment at first the message “Hello world” is hidden using the previously stated images and LSB and chaotic mapping is implemented on them. The result of the required time, MSE, SNR and PSNR values are calculated. Then the same values are calculated for the same imagesbut this time for a different message.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1103 Table III: Comparison of Performance factors Fig 4: Required time in seconds for message size of 11. From figure 4 and 5 it is clearly observedthatchaoticlogistic mapping. takes much higher time than LSB. In case of single image processing’sperspectivechaoticlogisticmappingtook more time for high resolution images in case of 11 character message. For 43 character message required time is almost identical for both LSB and chaotic logistic mapping. Fig 5: Required time in seconds for message size of 43. Now from individual algorithm’s perspective MSE value can be seen increasing rapidly with message sizeincreaseinLSB algorithm as shown in figure 6. While for the same images and message size very low increment is in MSE values are seen for chaotic logistic mapping. Fig 6: Comparison of LSB MSE values for message size of 11 and 43. Fig 7: Comparison of Chaotic LM MSE values for message size of 11 and 43. From figure 7 and 8 relative comparison of PSNR value can be seen for both LSB and Chaotic LM. For LSB increase in message size results in increasing noise between stego- image and original image. 43 character message almost resulted in 2 times multiplied noise for LSB. Fig 8: Comparison of LSB PSNR values for message size of 11 and 43. While noise is almost similar in case of Chaotic LM for increasing message size. So according to the findings it can be evidently said that Chaotic Logistic Mapping is more scalable with respect to LSB in case of steganographic purposes. It is also observed that although generic implementation of Chaotic Logistic Mapping requires more time than LSB but impact of message size is also very little for the previous one. Fig 9: Comparison of Chaotic LM PSNR values for message size of 11 and 43.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD42494 | Volume – 5 | Issue – 4 | May-June 2021 Page 1104 Table IV: Summary of Time, MSE, SNR and PSNR values for message size of 11. An overview of all findings is depicted in tableIVandtable V. For clearance respected SNR values are also included with required Time, MSE and PSNR values for each image and respective message size. Table V: Summary of Time, MSE, SNR and PSNR values for message size of 43. Since, the larger the value of PSNR, the more similarity between the hidden image and the cover image [6]. From this experimental resultstego-imageinLSBhasmoreremain more similar to the cover image. CONCLUSION In this paper, two of the major image steganography techniques have been discussed. Although both techniques have structural differences, based on our experiments, we have found that chaotic logistic mapping is more suitable when the message size is larger. It provides better security for the secret message. On the other hand, the least significant bit (LSB) is more suitable when a short message needs to be embedded on the cover image. The LSB is the better choice if we want to embed the message in a short amount of time since the embedding time in LSB is significantly less the chaotic logistic mapping. Impact of significant increase or decrease of message size on Chaotic Logistic Mapping and Least Significant Bit should be further explored to find the tolerance limit. The above findings can also help to predict the number of cover images requiredfor sending a specific messagebasedonselectedsteganographic technique. Optimal algorithm can also help sending bigger messages using lowest number of cover images. REFERENCES [1] Morkel, T., J. Eloff and M. Olivier. “An overview of image steganography, Proceedings of the ISSA 2005 New Knowledge Today Conference,” 2005, pp. 1-11. [2] K. Thangadurai and G. Sudha Devi, "AnanalysisofLSB based image steganography techniques, 2014 International Conference on Computer Communication and Informatics,” 2014, pp. 1-4, doi: 10.1109/ICCCI.2014.6921751. [3] Mohammed Mahdi Hashim, Mohd Shafry Mohd Rahim, Fadil Abass Johi, Mustafa Sabah Taha, Hassan Salman Hamad, “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats, International Journal of Engineering and Technology,” Volume 7, Issue 4, 2018, pp.3506-3514, doi:10.14419/ijet.v7i4.17294. [4] Goel, Stuti. (2013), “A Review of Comparison Techniques of Image Steganography, IOSR Journal of Electrical and Electronics Engineering,” Volume 13, Issue 4, 2013, pp. 41-48, ISSN 2214-2126, pp. 41-48. 10.9790/1676-0614148. [5] Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani, “A new transform domain steganography based on modified logistic chaotic map for color images, Journal of Information Security and Applications,” Volume 34, Part 2, 2017, pp. 142-151, ISSN 2214-2126, doi:10.1016/j.jisa.2017.04.004. [6] X. Zhou, W. Gong, W. Fu and L. Jin, "An improved method for LSB based color image steganography combined with cryptography, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS),” 2016, pp. 1-4, doi: 10.1109/ICIS.2016.7550955. [7] Xia, Zhihua & Wang, Xinhui & Xingming, Sun & Wang, Baowei. (2014). Steganalysis of least significant bit matching using multiorder differences. Security and Communication Networks. 7. 10.1002/sec.864. [8] Mandal, M., Nandi, D., Banik, G., & Chattopadhyay, D. (2012). An image encryption process based on Chaotic logistic map. IETE Technical Review, 29(5), 395. doi:10.4103/0256-4602.103173