Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
This document discusses an adaptive pixel value differencing (PVD) based secret data hiding technique. It begins with an introduction to steganography and some common steganography techniques. The proposed method aims to embed most data into edged areas of an image since there are larger pixel differences, increasing embedding capacity. It implements a PVD-based embedding and extraction algorithm. Experimental results on Lena and Baboon images show increased payload and acceptable stego image quality compared to LSB substitution. The proposed method effectively and efficiently embeds hidden information imperceptibly into cover images.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with
cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for
the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to
secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of -5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
The document provides an overview of steganography, discussing various techniques for hiding secret messages in digital files like images, audio, and video. It describes methods for embedding data in the frequency and spatial domains of digital files. The paper also compares steganography to encryption and digital watermarking, outlining the goals and measures of different steganography techniques.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
This document discusses an adaptive pixel value differencing (PVD) based secret data hiding technique. It begins with an introduction to steganography and some common steganography techniques. The proposed method aims to embed most data into edged areas of an image since there are larger pixel differences, increasing embedding capacity. It implements a PVD-based embedding and extraction algorithm. Experimental results on Lena and Baboon images show increased payload and acceptable stego image quality compared to LSB substitution. The proposed method effectively and efficiently embeds hidden information imperceptibly into cover images.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with
cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for
the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to
secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of -5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
The document provides an overview of steganography, discussing various techniques for hiding secret messages in digital files like images, audio, and video. It describes methods for embedding data in the frequency and spatial domains of digital files. The paper also compares steganography to encryption and digital watermarking, outlining the goals and measures of different steganography techniques.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganographyn involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-à-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate steganlysis algorithms.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
This document summarizes a technical seminar presentation on steganography. It introduces steganography as covert communication techniques that hide messages within other harmless media. It discusses the history of steganography dating back to ancient Greece. It then outlines the presentation sections on the problem statement, objectives, techniques like LSB algorithm, design phase with screenshots, results and discussion, and conclusion. The overall goal is securing data transmission by hiding messages in digital images.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
This document discusses digital steganography, which is a method of hiding secret messages within other digital data, such as images. It proposes using a new technique of image steganography that embeds encrypted data into the least significant bit of image pixel values using a hash function and RSA encryption for added security. The objectives are to develop a security tool to hide messages in digital media in a way that is not detectable by humans. It analyzes existing steganography methods and their disadvantages, then proposes a system using LSB substitution to replace pixel bit values with encrypted message bits to create a stego-image. The document outlines the modules, algorithms, advantages and future enhancements of the proposed digital steganography system.
1) The document reviews various techniques for hiding information in digital images, known as image steganography. It discusses techniques like LSB insertion, PVD, edge-based, and PIT methods.
2) It provides an overview of each technique, outlining their advantages and disadvantages. For example, it notes that LSB insertion is simple but vulnerable, while PVD provides higher capacity with better imperceptibility.
3) The document also covers applications of steganography like copyright control, secret communication, tamper proofing, and digital watermarks. It analyzes how steganographic techniques can be evaluated based on metrics like capacity, security, and robustness against modifications.
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
Similar to LSB Based Image Steganography for Information Security System (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docxEticketing.co
We offer Euro Cup Tickets to admirers who can get Turkiye vs Georgia Tickets through our trusted online ticketing marketplace. Eticketing.co is the most reliable source for booking Euro Cup Final Tickets. Sign up for the latest Euro Cup Germany Ticket alert.
Paris 2024 History-making Matildas team selected for Olympic Games.pdfEticketing.co
Paris 2024 fans worldwide can book Olympic Football Tickets from our online platforms e-ticketing. co. Fans can book Olympic Tickets on our website at discounted prices. Experience the thrill of the Games in Paris and support your favourite athletes as they compete for glory.
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docxEticketing.co
The Golden Group is over. Can a new group step up? Two years ago, Kevin De Bruyne plunged Belgium’s Euro 2024 plans into disorder when he claimed the team was “too old” to win in an interview with The Protector. That Belgian squad had 10 players over 30 and the maximum average age of any Euro Cup 2024 team at the competition. A group-stage exit and just one goal at the World Cup put Belgium on course for a restructure.
We offer Euro Cup Tickets to admirers who can get Belgium vs Romania Tickets through our trusted online ticketing marketplace. Eticketing.co is the most reliable source for booking Euro Cup Final Tickets. Sign up for the latest Euro Cup Germany Ticket alert.
Belgium vs Romania Tickets | Euro Cup Tickets | Euro Cup Final Tickets
Coach Domenico Tedesco has managed a tactical shakeup and a regular exit for some of the oldest players. Experienced bests remain, not least the 37-year-old Jan Vertonghen in defense, the 32-year-old De Bruyne himself in midfield, and 31-year-old Romelu Lukaku up visible.
Still, younger actors like De Bruyne’s Manchester City partner Jeremy Doku bring fresh vitality to the team. Euro Cup Germany Qualifying unbeaten with just four goals allowed from eight games was a welcome sign of accomplishment back on track under Tedesco.
The only other squad in Group E besides Belgium to UEFA Euro 2024 qualify unbeaten, Romania was awestruck by winning a group that also checked Switzerland and Israel. Still, Euro 2024 will test a squad sorely lacking in top-level skill.
Euro 2024: Belgium's Transition from Golden Generation to New Hope
Tottenham guardian Vlad Dragusin is the only Euro Cup 2024 squad member singing regularly for one of Europe’s top clubs this flavor. He even played only nine Premier League games since adoption in January. Goalkeeper Horatiu Moldovan is a stoppage at Atletico Madrid.
There’s a link to the beauty days of Romanian soccer with midfielder Ianis Hagi, son of Gheorghe Hagi, who assisted the team to the rounds of the 1994 World Cup and Euro 2000.
We are only a combine of days away from the UEFA Euro 2024 curtain raiser. The 24 squads are winding up their provisions and getting ready to give it their all to life the wanted Euro Cup Final trophy on July 14. Spread across six clusters, the first hurdle in the knockout phase will be the plump of 16.
Euro fans worldwide can book Euro 2024 Tickets from our online platform, www.eticketing.co. Fans can book Euro Cup 2024 Tickets on our website at discounted prices.
Germany and Scotland will take things off before we get into overdrive in two weeks. Meanwhile, Belgium will be longing to bounce back after a horrendous 2022 FIFA World Cup movement, which ended in the group stage.
Belgium vs Romania Tickets | Euro Cup 2024 Tickets | Euro Cup Tickets | Euro Cup Final Tickets
Roberto Martinez completed the way for Domenico Tedesco, who has overseen a compact start to his tenure. The 38-year-old will be assured heading into the group stage
According to the report, the consumption of video content related to IPL 2024 has seen significant growth, nearly 3 times more than the previous season, reflecting an increasing interest of fans.
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdfEticketing.co
Euro 2024 fans worldwide can book Georgia vs Portugal Tickets from our online platform www.eticketing.co. Fans can book Euro Cup Germany Tickets on our website at discounted prices.
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...Eticketing.co
We offer Euro Cup Tickets to admirers who can get Belgium vs Slovakia Tickets through our trusted online ticketing marketplace. Eticketing.co is the most reliable source for booking Euro Cup Final Tickets. Sign up for the latest Euro Cup Germany Ticket alert.
Here are our Euro 2024 predictions for the group stages
Will England make it through the group stages?, Will Germany use the home advantage to full effect?
Follow our progress, see how many we get right
If you want to join in let us know before the first game kick off and we can invite you to our private league
or join in with our friends at DeeperThanBlue
https://www.linkedin.com/posts/activity-7204868572995538944-qejG
https://www.selectdistinct.co.uk/2024/06/13/euro-2024-match-predictions/
#EURO2024 #Germany2024 #England #EURO2024predictions
Hesan Soufi's Legacy: Inspiring the Next GenerationHesan Soufi
Hesan Soufi's impact on the game extends far beyond his on-field exploits. With his humility, sportsmanship, and unwavering commitment to excellence, Soufi has become a role model for aspiring footballers worldwide. His legacy lies not only in his achievements but also in the inspiration he provides to the next generation of talented players.
Psaroudakis: Family and Football – The Psaroudakis Success StoryPsaroudakis
Psaroudakis, a name that resonates with football fans around the globe, is a testament to the powerful synergy between familial support and individual passion. Born on March 10, 1992, in the historic city of Heraklion, Crete, Psaroudakis’ journey to international football stardom is a compelling narrative of dedication, perseverance, and unwavering family support. His story not only highlights his athletic prowess but also underscores the crucial role his family played in shaping his career and character.
Psaroudakis’ early life in Heraklion was deeply influenced by a supportive and nurturing family environment. His father, a former semi-professional footballer, recognized Psaroudakis’ potential from an early age. Acting as his first coach, his father’s guidance was instrumental in igniting Psaroudakis’ passion for football. This paternal influence instilled in him a strong work ethic and fundamental skills that would become the foundation of his future success. His mother, a dedicated homemaker, provided a stable and nurturing environment, ensuring that Psaroudakis could pursue his dreams without any hindrances.
From a young age, Psaroudakis showed an innate talent for football. Growing up in Heraklion, he spent countless hours playing football in local parks and streets with friends and family. His natural ability was evident even in these informal settings, and his enthusiasm for the game was infectious. By the age of five, Psaroudakis had joined a local youth football club, where his skills began to flourish. His father’s role as his first coach during these formative years was crucial, as he emphasized not only technical skills but also the importance of discipline and teamwork.
The transition from playing in local parks to joining a structured football environment marked a significant step in Psaroudakis’ journey. At the age of ten, he joined the youth academy of OFI Crete, one of Greece’s most esteemed football clubs. This move marked the beginning of a more rigorous and professional approach to his training. The academy environment was demanding, focusing on honing technical abilities and instilling values of sportsmanship and dedication. Psaroudakis’ dedication to his craft was evident as he quickly rose through the ranks, becoming a standout player in the youth teams.
The support of Psaroudakis’ family was unwavering during this critical period. His father continued to be a source of guidance and mentorship, while his mother ensured that he had everything he needed to succeed. Their collective efforts created a balanced environment where Psaroudakis could focus entirely on his development as a footballer. This familial support was not just about providing the basics; it was about creating an environment where Psaroudakis felt encouraged and motivated to pursue his dreams relentlessly.
As Psaroudakis transitioned from the youth academy to professional football, the challenges became more significant.
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...Eticketing.co
Euro Cup Germany fans worldwide can book Euro 2024 Tickets from our online platform www.eticketing.co.Fans can book Euro Cup 2024 Tickets on our website at discounted prices.
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...Eticketing.co
Olympic 2024 fans worldwide can book Olympic Football Tickets from our online platforms e-ticketing. co. Fans can book Olympic Tickets on our website at discounted prices. Experience the thrill of the Games in Paris and support your favorites athletes as they compete for glory.
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docxEuro Cup 2024 Tickets
Italy are the defending European champs, but after Luciano Spalletti swapped Roberto Mancini last September, they are still taking the cautious first steps of a new era
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
LSB Based Image Steganography for Information Security System
1. International Journal of Trend in
International Open Access Journal
ISSN No: 2456 - 6470
@ IJTSRD | Available Online @ www.ijtsrd.com
LSB Based Image Steganography
Professor,
Kayah State, Republic of t
ABSTRACT
Information hiding in a cover file is one of the most
modernized and effective ways for transferring secret
message from sender to receiver over the
communication channel. There are many
steganographic techniques for hiding secret message
in image, text, audio, video and so on. Image
Steganography is also one of the common methods
used for hiding the information in the cover image. In
this research work, the secret message is hidden in a
cover image file using image steganography. LSB is
very efficient algorithm used to embed the
information in a cover file. The LSB based image
steganography with various file sizes is analyzed and
illustrated their results. Bitmap (*.bmp) image is used
as a cover image file to implement the proposed
system. The detail Least Significant Bit (LSB) based
image steganography is introduced. In this paper, the
new embedding algorithm and extracting algorithm
are presented. While embedding the secret message in
a cover image file, the starting embedded pixel is
chosen according to public shared key between sender
and receiver. The original cover image and embedded
image with secret message are analyzed with PSNR
values and SNR values to achieve security. The
resulting embedded image shows the acceptable
PSNR and SNR values while comparing with the
original cover image. The proposed system can help
the information exchanging system over
communication media.
Keywords: Image Steganography, LSB, Data hiding,
information security, PSNR
I. INTRODUCTION:
Significant advancements in digital imaging during
the last decade have added a few innovative
dimensions to the field of image processing [1]. The
word steganography is derived from the Greek words
stegos meaning cover and grafia meaning writing [2].
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
6470 | Volume - 3 | Issue – 1 | Nov – Dec 2018
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
LSB Based Image Steganography for Information Security System
Aung Myint Aye
, University of Computer Studies, Loikaw,
Republic of the Union of Myanmar, Myanmar
Information hiding in a cover file is one of the most
modernized and effective ways for transferring secret
message from sender to receiver over the
communication channel. There are many
steganographic techniques for hiding secret message
in image, text, audio, video and so on. Image
Steganography is also one of the common methods
used for hiding the information in the cover image. In
this research work, the secret message is hidden in a
over image file using image steganography. LSB is
very efficient algorithm used to embed the
information in a cover file. The LSB based image
steganography with various file sizes is analyzed and
Bitmap (*.bmp) image is used
cover image file to implement the proposed
system. The detail Least Significant Bit (LSB) based
image steganography is introduced. In this paper, the
new embedding algorithm and extracting algorithm
are presented. While embedding the secret message in
over image file, the starting embedded pixel is
chosen according to public shared key between sender
and receiver. The original cover image and embedded
image with secret message are analyzed with PSNR
values and SNR values to achieve security. The
ng embedded image shows the acceptable
PSNR and SNR values while comparing with the
original cover image. The proposed system can help
the information exchanging system over
Image Steganography, LSB, Data hiding,
Significant advancements in digital imaging during
the last decade have added a few innovative
dimensions to the field of image processing [1]. The
word steganography is derived from the Greek words
grafia meaning writing [2].
In image steganography the information is hidden
exclusively in images. It is one of the effective means
of data hiding that protects data from unauthorized or
unwanted disclosure and can be used in various field
such as medicines, research, defense and intelligence
for secret data storage, confidential communication,
protection of data from alteration and disclosure and
access control in digital distribution.
The original files can be referred to as cover text,
cover image, or cover audio. After inserting the secret
message, it is referred to as stego
key is used for hiding/encoding process to restrict
detection or extraction of the embedded data [2]. The
image obtained after insertion of message is called a
stego image. Insertion of secret message is done in
Least Significant Bit (LSB) of the image pixels in this
paper. Then the stego image formed is having a
message which is invisible to human eye. This means
that one cannot find the difference between the
original image and stego image. The secret message is
inserted by using an algorithm and the secret message
is obtained from stego image by using reverse
algorithm [4].
The organization and implementation of the paper is
as follows. The following section p
of Steganography. Then experimental results are
expressed and discussion and conclusion are at the
end.
II. STEGANOGRAPHY
Steganography is a process of secret communication
where a piece of information (a secret message) is
hidden into another piece of innocent looking
information, called a cover. The message is hidden
inside the cover in such a way that the very existence
of the secret information in the cover cannot be
estimated in any suspicion in the minds of the viewers
Research and Development (IJTSRD)
www.ijtsrd.com
Dec 2018
Dec 2018 Page: 394
or Information Security System
In image steganography the information is hidden
exclusively in images. It is one of the effective means
of data hiding that protects data from unauthorized or
unwanted disclosure and can be used in various field
cines, research, defense and intelligence
for secret data storage, confidential communication,
protection of data from alteration and disclosure and
access control in digital distribution.
The original files can be referred to as cover text,
or cover audio. After inserting the secret
message, it is referred to as stego-medium. A stego-
key is used for hiding/encoding process to restrict
detection or extraction of the embedded data [2]. The
image obtained after insertion of message is called a
stego image. Insertion of secret message is done in
Least Significant Bit (LSB) of the image pixels in this
paper. Then the stego image formed is having a
message which is invisible to human eye. This means
that one cannot find the difference between the
riginal image and stego image. The secret message is
inserted by using an algorithm and the secret message
is obtained from stego image by using reverse
The organization and implementation of the paper is
as follows. The following section presents the process
of Steganography. Then experimental results are
expressed and discussion and conclusion are at the
STEGANOGRAPHY
Steganography is a process of secret communication
where a piece of information (a secret message) is
ther piece of innocent looking
information, called a cover. The message is hidden
inside the cover in such a way that the very existence
of the secret information in the cover cannot be
estimated in any suspicion in the minds of the viewers
2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
[1]. Steganography is the art and science of
communicating in a way which hides the existence of
the communication. Steganography plays an
important role in information security. It is the art of
invisible communication by concealing information
inside other information.
A digital image is described using a 2-D matrix of the
color intestines at each grid point (i.e. pixel).
Typically gray images use 8 bits, whereas colored
utilizes 24 bits to describe the color model, such as
RGB model. The Steganography system which us
an image as the cover, there are several techniques to
conceal information inside cover image. The spatial
domain techniques manipulate the cover image pixel
bit values to embed the secret information. The secret
bits are written directly to the cover image pixel bytes.
Consequently, the spatial domain techniques are
simple and easy to implement. The Least Significant
Bit (LSB) is one of the main techniques in spatial
domain image Steganography. The LSB is the lowest
significant bit in the byte value of the image pixel.
The LSB based image steganography embeds the
secret in the least significant bits of pixel values of the
cover image (CVR) [7]. One of the common
techniques is based on manipulating Least Significant
Bit (LSB) planes by directly replacing the LSBs of the
cover-image with the message bits. LSB methods
typically achieve high capacity [6]. LSB substitution
is also the process of adjusting the least significant bit
pixels of the carrier image [8].
The concept of LSB Embedding is simple. It exp
the fact that the level of precision in many image
formats is far greater than that perceivable by average
human vision. Therefore, an altered image with slight
variations in its colors will be indistinguishable from
the original by a human being, just by looking at it. In
conventional LSB technique, which requires eight
bytes of pixels to store 1byte of secret data but in
proposed LSB technique, just four bytes of pixels are
sufficient to hold one message byte. Rest of the bits in
the pixels remains the same.
III. LEAST SIGNIFICANT BIT (LSB)
TECHNIQUE
In Least Significant Bit Algorithm, both secret
message and the cover image are firstly converted
from their pixel format to binary. And the Least
Significant Bit of the image is substituted with the bit
of the secret message to be transferred so as to reflect
the message that needs to be hidden. The bits of the
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
phy is the art and science of
communicating in a way which hides the existence of
the communication. Steganography plays an
important role in information security. It is the art of
invisible communication by concealing information
D matrix of the
color intestines at each grid point (i.e. pixel).
Typically gray images use 8 bits, whereas colored
utilizes 24 bits to describe the color model, such as
RGB model. The Steganography system which uses
an image as the cover, there are several techniques to
conceal information inside cover image. The spatial
domain techniques manipulate the cover image pixel
bit values to embed the secret information. The secret
mage pixel bytes.
Consequently, the spatial domain techniques are
simple and easy to implement. The Least Significant
Bit (LSB) is one of the main techniques in spatial
domain image Steganography. The LSB is the lowest
the image pixel.
The LSB based image steganography embeds the
secret in the least significant bits of pixel values of the
cover image (CVR) [7]. One of the common
techniques is based on manipulating Least Significant
the LSBs of the
image with the message bits. LSB methods
typically achieve high capacity [6]. LSB substitution
is also the process of adjusting the least significant bit
The concept of LSB Embedding is simple. It exploits
the fact that the level of precision in many image
formats is far greater than that perceivable by average
human vision. Therefore, an altered image with slight
variations in its colors will be indistinguishable from
st by looking at it. In
conventional LSB technique, which requires eight
bytes of pixels to store 1byte of secret data but in
proposed LSB technique, just four bytes of pixels are
sufficient to hold one message byte. Rest of the bits in
LEAST SIGNIFICANT BIT (LSB)
In Least Significant Bit Algorithm, both secret
message and the cover image are firstly converted
from their pixel format to binary. And the Least
Significant Bit of the image is substituted with the bit
the secret message to be transferred so as to reflect
the message that needs to be hidden. The bits of the
secret message replace each of the colors of the Least
Significant Bit of the Image [9]. Every pixel in an
image indicates a color and, the each ima
up of pixels [5].
The right-most value is the LSB value of related
image pixel sequence. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
to a 1 does not have a huge impact on the final result.
Each 8-bit binary sequence is used for expressing the
color of a pixel for an image, so changing the LSB
value from a 0 to 1 does not impose a major change
and it is unlikely to be noticed by an observer. In fact,
the LSBs of each pixel value could be potentially
modified, and the changes would still not be visible.
This provides an enormous amount of redundancy in
the image data, which means that we can effectively
substitute the LSBs of the image data, with each bit of
the message data until the entire message has been
embedded. This is meant by Least Significant Bit
Substitution Method.
One of the earliest stego-systems to surface was those
referred to as Least Significant Bit Substitution
techniques, socalled because of how the message data
is embedded within a cover image c. In computer
science, the term Least Significant Bit (LSB) refers to
the smallest (right-most) bit of
structure of binary is such that each
be either a 0 or a 1, often thought of as off
respectively. Starting from the right, the value (if on)
denotes a 1. The value to its left (if on) denotes a 2,
and so on where the values double each time.
This value essentially determines whether the total
sum is odd or even. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
to a 1 does not have a huge impact on the final f
it will only ever change by +1 at most. If we now
think of each 8-bit binary sequence as a means of
expressing the colour of a pixel for an image, it
should be clear to see that changing the LSB value
from a 0 to a 1 will only change the colour by +
change that is unlikely to be noticed with the naked
eye. In fact, the LSBs of each pixel value could
potentially be modified, and the changes would still
not be visible. This highlights a huge amount of
redundancy in the image data, and means that w
effectively substitute the LSBs of the image data, with
each bit of the message data until the entire message
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 395
secret message replace each of the colors of the Least
Significant Bit of the Image [9]. Every pixel in an
image indicates a color and, the each image is made
most value is the LSB value of related
image pixel sequence. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
e a huge impact on the final result.
bit binary sequence is used for expressing the
color of a pixel for an image, so changing the LSB
value from a 0 to 1 does not impose a major change
and it is unlikely to be noticed by an observer. In fact,
SBs of each pixel value could be potentially
modified, and the changes would still not be visible.
This provides an enormous amount of redundancy in
the image data, which means that we can effectively
substitute the LSBs of the image data, with each bit of
the message data until the entire message has been
embedded. This is meant by Least Significant Bit
systems to surface was those
referred to as Least Significant Bit Substitution
because of how the message data
within a cover image c. In computer
Significant Bit (LSB) refers to
most) bit of a binary sequence. The
structure of binary is such that each integer may only
r a 0 or a 1, often thought of as off and on
Starting from the right, the value (if on)
value to its left (if on) denotes a 2,
double each time.
This value essentially determines whether the total
sum is odd or even. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
to a 1 does not have a huge impact on the final figure;
it will only ever change by +1 at most. If we now
bit binary sequence as a means of
expressing the colour of a pixel for an image, it
should be clear to see that changing the LSB value
from a 0 to a 1 will only change the colour by +1 - a
change that is unlikely to be noticed with the naked
eye. In fact, the LSBs of each pixel value could
potentially be modified, and the changes would still
not be visible. This highlights a huge amount of
redundancy in the image data, and means that we can
effectively substitute the LSBs of the image data, with
each bit of the message data until the entire message
3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
has been embedded. This is meant by Least
Significant Bit Substitution. Now if the message is
embedded as is into LSB of the cover image, th
resultant structure in the LSB plane of the stego
image would clearly be a giveaway [3]. The
embedding algorithm at the sender side and extracting
algorithm at the receiver side are presented as follows:
A. The embedding algorithm at the sender side
Step (1) : Get the input cover image and secret
message.
Step (2) : Accept the stego-key from the user and
calculate average value of them.
Step (3) : Convert each character of secret message
and each LSB bit of cover image (R
channel) from the position of
average of stego-key.
Step (4) : Substitute the LSB bit of cover image (R
channel) with binary values of secret
IV. IMPLEMENTATION OF PROPOSED SYSTEM
In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of
secret message and each pixel of cover bmp image are converted into binary values. The user has to input
stego-key as the password of stego-key is u
Figure1. Overview of proposed system
After inserting secret message into cover image file,
the resulting stego-image is sent to the receiver
through the desired communication channel. The
above figure 1 shows the overall system design of
proposed system.
While inserting a binary bit of secret message into
cover image, each pixel value of cover image, which
is in decimal in value, is converted into binary values
as shown in figure 2. In this case, there are R, G, B
channel values of each pixel of cover image, but only
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
has been embedded. This is meant by Least
Significant Bit Substitution. Now if the message is
embedded as is into LSB of the cover image, then the
resultant structure in the LSB plane of the stego-
image would clearly be a giveaway [3]. The
embedding algorithm at the sender side and extracting
algorithm at the receiver side are presented as follows:
The embedding algorithm at the sender side
: Get the input cover image and secret
key from the user and
calculate average value of them.
: Convert each character of secret message
and each LSB bit of cover image (R-
channel) from the position of calculated
: Substitute the LSB bit of cover image (R-
channel) with binary values of secret
message with respect to the starting point
until the end of secret message.
Step (5) : Insert the end character value at the end of
secret message.
Step (6) : Calculate the PSNR, SNR of original and
resulting images.
Step (7) : Send a stego-image to the receiver.
B. The extracting algorithm at the receiver side
Step (1) : Get the input stego
calculate average valu
Step (2) : Load the stego-image that is sent from the
sender.
Step (3) : Extract each of LSB bit from the stego
image until to find out the end bit.
Step (4) : Reconstruct the collecting LSB bits from
the stego-image.
Step (5) : Transform the LSB bits to correspondent
characters.
IMPLEMENTATION OF PROPOSED SYSTEM
In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of
secret message and each pixel of cover bmp image are converted into binary values. The user has to input
key is used to embed the secret message in a cover file.
Figure1. Overview of proposed system
After inserting secret message into cover image file,
image is sent to the receiver
on channel. The
above figure 1 shows the overall system design of
While inserting a binary bit of secret message into
cover image, each pixel value of cover image, which
is in decimal in value, is converted into binary values
figure 2. In this case, there are R, G, B
channel values of each pixel of cover image, but only
the R-channge LSB bit values are used to substitute.
Similarly each character of secret message is
converted from decimal value to binary value. Finally
the converted binary value of secret message is
substituted into each LSB bit of R
image until the end of secret message. In this case the
starting substitution point is chosen according to the
input stego-key. The figure 3 illustrates the
substitution of secret message into each LSB bit of
cover image.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 396
message with respect to the starting point
until the end of secret message.
: Insert the end character value at the end of
: Calculate the PSNR, SNR of original and
image to the receiver.
The extracting algorithm at the receiver side
: Get the input stego-key from the userand
calculate average value of them.
image that is sent from the
: Extract each of LSB bit from the stego-
image until to find out the end bit.
: Reconstruct the collecting LSB bits from
: Transform the LSB bits to correspondent
In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of
secret message and each pixel of cover bmp image are converted into binary values. The user has to input
sed to embed the secret message in a cover file.
channge LSB bit values are used to substitute.
Similarly each character of secret message is
converted from decimal value to binary value. Finally
verted binary value of secret message is
substituted into each LSB bit of R-channel of cover
image until the end of secret message. In this case the
starting substitution point is chosen according to the
key. The figure 3 illustrates the
tution of secret message into each LSB bit of
4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure2. Pixel representation and binary values
Figure 3.LSB substitution algorithm of proposed
system
While defining the starting point of embedding LSB,
the stego-key is firstly collected from the user. The
summation of the ASCII value of each character of
stego-key is calculated and then the average of those
characters value is computed. While substituting the
secret message into LSB of cover image, the first LSB
position is chosen according to the calculated average
value of input stego-key characters. Then the
substitution processing will continue until the end of
secret message.
V. EXPERIMENTAL RESULTS AND
ANALYSIS
The following figure 4 shows the required processes
at the sender side, in this case, the user has to input
the stego-key which is already shared with the
receiver side. In this research work, the cover image
type of bmp is used to evaluate.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
2. Pixel representation and binary values
Figure 3.LSB substitution algorithm of proposed
While defining the starting point of embedding LSB,
from the user. The
summation of the ASCII value of each character of
key is calculated and then the average of those
characters value is computed. While substituting the
secret message into LSB of cover image, the first LSB
ng to the calculated average
key characters. Then the
substitution processing will continue until the end of
EXPERIMENTAL RESULTS AND
The following figure 4 shows the required processes
at the sender side, in this case, the user has to input
key which is already shared with the
receiver side. In this research work, the cover image
Figure 4.Sender side of proposed system
There are three portions at the sender side to accept as
shown in figure 4.The first one is choosing the input
cover image file, and then inputting the desired secret
message and finally stego-key. The stego
important to substitute and to extract secret message
at both sides. The secret message should be arbitrary,
the size of secret message can increase the processing
time of substitution into the cover image.
The following figure 5 shows the overall processes at
the receiver side. The first important one is stego
which is used to evaluate the average value of input
characters. After calculating the average of input
characters, the proposed system can point
starting point to extract the secret message. The
second important one is the sent stego
must be in bmp file format only. Finally the proposed
system can successfully extract the original secret
message with correct stego-key.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 397
ender side of proposed system
There are three portions at the sender side to accept as
shown in figure 4.The first one is choosing the input
cover image file, and then inputting the desired secret
key. The stego-key is very
tant to substitute and to extract secret message
at both sides. The secret message should be arbitrary,
the size of secret message can increase the processing
time of substitution into the cover image.
The following figure 5 shows the overall processes at
the receiver side. The first important one is stego-key
which is used to evaluate the average value of input
characters. After calculating the average of input
characters, the proposed system can point out the
starting point to extract the secret message. The
second important one is the sent stego-image which
must be in bmp file format only. Finally the proposed
system can successfully extract the original secret
key.
5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure5. Receiver side of proposed system
When the proposed system evaluates, the original
cover image is changed according to the input secret
message and stego-key. The PSNR and SNR values of
original and resulting images are calculated and
compared in the following table 1. The resulting
PSNR and SNR values of substituted cover image
show a little bit changes with the original ones. In this
case, different six bmp cover images are used to
implement the proposed system.
In order to measure the performance of t
compression algorithms two performance parameters
are used in this system.
Signal to Noise Ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
A. Signal to Noise Ratio
The signal to noise ratio (SNR) is a technical term
used to characterize the quality of the signal detection
of a measuring system. In this case, a system uses a
Table1. The comparison results of PSNR and SNR values between original and embedded images
No. Types of Images
Original Image
PSNR
1 flower.bmp 22.2474
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
Receiver side of proposed system
evaluates, the original
cover image is changed according to the input secret
key. The PSNR and SNR values of
original and resulting images are calculated and
lowing table 1. The resulting
PSNR and SNR values of substituted cover image
show a little bit changes with the original ones. In this
case, different six bmp cover images are used to
In order to measure the performance of the image
compression algorithms two performance parameters
The signal to noise ratio (SNR) is a technical term
used to characterize the quality of the signal detection
of a measuring system. In this case, a system uses a
noise “salt and pepper” with the original cover
images.
B. Peak Signal to Noise Ratio (PSNR)
Mean Squared Error (MSE) is defined as the square of
differences in the pixel values between the
corresponding pixels of the two images. The mean
square error (MSE) of N * M size image is given by
the following equation (1),
MSE= ΣM, N [I1 (m, n) –I2 (m, n)]
M &N -number of rows and columns in the input
images.
PSNR (peak signal to noise ratio)
to-noise ratio often abbreviated PSNR, is an
engineering name, for the ratio between the maximum
possible power of a signal and the power of
corrupting noise that affects the fidelity.
The peak error between the compressed image and
original image is measured in terms of PSNR. The
higher value of PSNR indicates higher quality of
image. To calculate PSNR, MSE is first computed.
PSNR value can be derived as in equation (2). Here
‘O’ and ‘D’ are the original and the distorted image
pixel values (binary), respectively, to be compared,
and the image size is M x N.
MSE
MAX
PSNR
2
10log10
Here, MAX is the peak value of the pixels in an image.
MAX is 255 when pixels are presented in an 8
bitformat. Theoretically, the higher the PSNR value
is, the better the image processing is; however,
practically, there are some problems reported in the
literature about the use of the PSNR for image quality
assessment.
1. The comparison results of PSNR and SNR values between original and embedded images
Original Image Embedded Image
Image Size Resulting Images
SNR PSNR SNR
17.5806 22.2568 17.59 255x256
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 398
noise “salt and pepper” with the original cover
Peak Signal to Noise Ratio (PSNR)
an Squared Error (MSE) is defined as the square of
differences in the pixel values between the
corresponding pixels of the two images. The mean
square error (MSE) of N * M size image is given by
I2 (m, n)] 2 / (M*N) (1)
number of rows and columns in the input
PSNR (peak signal to noise ratio) -PSNR Peak signal-
noise ratio often abbreviated PSNR, is an
engineering name, for the ratio between the maximum
possible power of a signal and the power of
corrupting noise that affects the fidelity.
tween the compressed image and
original image is measured in terms of PSNR. The
higher value of PSNR indicates higher quality of
image. To calculate PSNR, MSE is first computed.
PSNR value can be derived as in equation (2). Here
nal and the distorted image
pixel values (binary), respectively, to be compared,
(2)
is the peak value of the pixels in an image.
is 255 when pixels are presented in an 8-
bitformat. Theoretically, the higher the PSNR value
the better the image processing is; however,
there are some problems reported in the
literature about the use of the PSNR for image quality
1. The comparison results of PSNR and SNR values between original and embedded images
Resulting Images
6. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
2 mandrill.bmp 21.8341
3 lenna.bmp 21.9866
4 peppers.bmp 21.9163
5 sails.bmp 21.9336
6 boy.bmp 21.9816
VI. DISCUSSION AND CONCLUSION
In this research work, proposed LSB based
steganography for embedding and extracting
algorithms are presented. LSB based steganography
embed the text message in LSB of the pixels of cover
image according to the input stego-key. This paper
also compares the results of PSNR values and SNR
values of original and resulting cover images. The
main goal of this paper is to show how secret image
can be embedded and how it can be sent through the
internet by fooling grabbers.
Many problems can be encountered when important
data is transferred over the public communication
media. A safe and secure procedure is needed to
transfer them easily. For this purpose simple image
hiding techniques are used and the quality of stego
images is also improved by using LSB substitution
algorithms. So the hackers may not estimate secret
message with resultingstego image. The experimental
results show that the stego image and the cover image
remain more or less identical which is the main focus
of this paper. This means that a secret message can be
sent to the destination without changes.
PSNR and SNR values of original and embedded
images are compared and analyzed. The comparison
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
16.6596 21.8459 16.67 512x512
16.8408 22.0123 16.87 220x220
12.4611 21.9112 12.46 512x512
16.9037 22.0068 16.98 768x512
17.1659 21.9232 17.11 768x512
DISCUSSION AND CONCLUSION
In this research work, proposed LSB based
steganography for embedding and extracting
algorithms are presented. LSB based steganography
embed the text message in LSB of the pixels of cover
key. This paper
also compares the results of PSNR values and SNR
values of original and resulting cover images. The
main goal of this paper is to show how secret image
can be embedded and how it can be sent through the
Many problems can be encountered when important
over the public communication
media. A safe and secure procedure is needed to
transfer them easily. For this purpose simple image
hiding techniques are used and the quality of stego
images is also improved by using LSB substitution
rs may not estimate secret
message with resultingstego image. The experimental
results show that the stego image and the cover image
remain more or less identical which is the main focus
of this paper. This means that a secret message can be
stination without changes. Finally the
PSNR and SNR values of original and embedded
images are compared and analyzed. The comparison
results show that the embedded resulting image is
totally identical with the original ones.
As the further work, other color cover image types
such as jpg, tiff, png and so on will be used to
compare with those results. Another better embedding
and extracting algorithms will be used to implement
it. Also not only secret text message but also secret
image or data will be used to embed in a cover file. It
is expected to find better technique and algorithms to
hide more data in a cover image.
Reference
1. M. Mishra, Department of Information and
Communication Technology and Dr. M.C.
Adhikary, Department of Applied Physics and
Ballistics, “An Easy Yet Effective Method for
Detecting Spatial Domain LSB Steganography”,
International Journal of Computer Science and
Business Informatics, vol.8, No.1 Dec 2013.
2. K. J. Devi, “A Secure Image Steganography using
LSB Technique and Pseudo Ran
Technique”, Department of Computer Science and
Engineering National Institute of Technology
Rourkela Odisha, Bachelor Thesis, May 2013.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 399
results show that the embedded resulting image is
totally identical with the original ones.
color cover image types
such as jpg, tiff, png and so on will be used to
compare with those results. Another better embedding
and extracting algorithms will be used to implement
it. Also not only secret text message but also secret
ed to embed in a cover file. It
is expected to find better technique and algorithms to
hide more data in a cover image.
M. Mishra, Department of Information and
Communication Technology and Dr. M.C.
Adhikary, Department of Applied Physics and
allistics, “An Easy Yet Effective Method for
Detecting Spatial Domain LSB Steganography”,
International Journal of Computer Science and
Business Informatics, vol.8, No.1 Dec 2013.
K. J. Devi, “A Secure Image Steganography using
LSB Technique and Pseudo Random Encoding
Technique”, Department of Computer Science and
Engineering National Institute of Technology-
Rourkela Odisha, Bachelor Thesis, May 2013.
7. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
3. R. Chandramouli, Msync lab, Stevens Institute of
Technology, Dept. of Electrical and Computer
Engineering, Hoboken and N. Memon,
Polytechnic University, Computer Science
Department, Brooklyn, “Analysis of LSB Based
Image Steganography Techniques, IEEE 2001.
4. A. Khurana, Dept of Electronic, Punjab, India and
B. M. Mehta, Dept of ECE, Punjab, India,
“Comparison of LSB and MSB based Image
Steganography, International Journal of Computer
Science and Technology, Vol. 3 Issue 3, July
2012.
5. R. R. Krupa, Department of Information
Technology, the Standard Fireworks, Rajaratnam
College for Women, Sivakasi, Tamilnadu,
“An Overview of Image Hiding Techniquess in
Image Processing”, The SIJ Transaction of
Computer Science Engineering and its
Applications (CSEA), Vol.2, No.2, March
2014.
6. C. Chan, Department of Computer Engineering
and Information Technology, City University of
Hong Kong, Hong Kong, “Hiding Data in Images
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
R. Chandramouli, Msync lab, Stevens Institute of
Technology, Dept. of Electrical and Computer
Hoboken and N. Memon,
Polytechnic University, Computer Science
Department, Brooklyn, “Analysis of LSB Based
Image Steganography Techniques, IEEE 2001.
A. Khurana, Dept of Electronic, Punjab, India and
B. M. Mehta, Dept of ECE, Punjab, India,
LSB and MSB based Image
Steganography, International Journal of Computer
Science and Technology, Vol. 3 Issue 3, July-Sept
R. R. Krupa, Department of Information
Technology, the Standard Fireworks, Rajaratnam
College for Women, Sivakasi, Tamilnadu, India,
“An Overview of Image Hiding Techniquess in
Image Processing”, The SIJ Transaction of
Computer Science Engineering and its
Applications (CSEA), Vol.2, No.2, March-April
C. Chan, Department of Computer Engineering
ty University of
Hong Kong, Hong Kong, “Hiding Data in Images
by Simple LSB Substitution”, the Journal of the
Pattern Recognition Society, August 2003.
7. B, S. Champakamala, K. Padmini, K. D. Radhika,
Department of TCE, Don Bosco Institute of
Technology, Bangalore, India, “Least Significant
Bit Algorithm for Image Steganography”,
International Journal of Advanced Computer
Technology, Vol.3, No.4, August 2014.
8. C, R, Ravinder, A, R, Roja, Department of Master
of Computer Appliccations, Teegala Krishna
Reddy Engineering College, Medbowli, Meerpet,
Hyderabad, “The Process of Encoding and
Decoding of Image Steganography using LSB
Algorithm”, International Journal of Computer
Science and Engineering Technology”, Vol.2,
Issue 11, Nov 2012.
9. 9. O. Osunade, and I. A. Ga
Computer Science, University of Ibadan, Ibadan,
“Enhancing the Least Significant Bit (LSB)
Algorithm for Steganography”, International
Journal of Computer Application, Vol. 149, No.3,
Sept 2016.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 400
by Simple LSB Substitution”, the Journal of the
Pattern Recognition Society, August 2003.
B, S. Champakamala, K. Padmini, K. D. Radhika,
Department of TCE, Don Bosco Institute of
galore, India, “Least Significant
Bit Algorithm for Image Steganography”,
International Journal of Advanced Computer
Technology, Vol.3, No.4, August 2014.
C, R, Ravinder, A, R, Roja, Department of Master
of Computer Appliccations, Teegala Krishna
ineering College, Medbowli, Meerpet,
Hyderabad, “The Process of Encoding and
Decoding of Image Steganography using LSB
Algorithm”, International Journal of Computer
Science and Engineering Technology”, Vol.2,
O. Osunade, and I. A. Ganiyu, Department of
Computer Science, University of Ibadan, Ibadan,
“Enhancing the Least Significant Bit (LSB)
Algorithm for Steganography”, International
Journal of Computer Application, Vol. 149, No.3,