SlideShare a Scribd company logo
International Journal of Trend in
International Open Access Journal
ISSN No: 2456 - 6470
@ IJTSRD | Available Online @ www.ijtsrd.com
LSB Based Image Steganography
Professor,
Kayah State, Republic of t
ABSTRACT
Information hiding in a cover file is one of the most
modernized and effective ways for transferring secret
message from sender to receiver over the
communication channel. There are many
steganographic techniques for hiding secret message
in image, text, audio, video and so on. Image
Steganography is also one of the common methods
used for hiding the information in the cover image. In
this research work, the secret message is hidden in a
cover image file using image steganography. LSB is
very efficient algorithm used to embed the
information in a cover file. The LSB based image
steganography with various file sizes is analyzed and
illustrated their results. Bitmap (*.bmp) image is used
as a cover image file to implement the proposed
system. The detail Least Significant Bit (LSB) based
image steganography is introduced. In this paper, the
new embedding algorithm and extracting algorithm
are presented. While embedding the secret message in
a cover image file, the starting embedded pixel is
chosen according to public shared key between sender
and receiver. The original cover image and embedded
image with secret message are analyzed with PSNR
values and SNR values to achieve security. The
resulting embedded image shows the acceptable
PSNR and SNR values while comparing with the
original cover image. The proposed system can help
the information exchanging system over
communication media.
Keywords: Image Steganography, LSB, Data hiding,
information security, PSNR
I. INTRODUCTION:
Significant advancements in digital imaging during
the last decade have added a few innovative
dimensions to the field of image processing [1]. The
word steganography is derived from the Greek words
stegos meaning cover and grafia meaning writing [2].
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
6470 | Volume - 3 | Issue – 1 | Nov – Dec 2018
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
LSB Based Image Steganography for Information Security System
Aung Myint Aye
, University of Computer Studies, Loikaw,
Republic of the Union of Myanmar, Myanmar
Information hiding in a cover file is one of the most
modernized and effective ways for transferring secret
message from sender to receiver over the
communication channel. There are many
steganographic techniques for hiding secret message
in image, text, audio, video and so on. Image
Steganography is also one of the common methods
used for hiding the information in the cover image. In
this research work, the secret message is hidden in a
over image file using image steganography. LSB is
very efficient algorithm used to embed the
information in a cover file. The LSB based image
steganography with various file sizes is analyzed and
Bitmap (*.bmp) image is used
cover image file to implement the proposed
system. The detail Least Significant Bit (LSB) based
image steganography is introduced. In this paper, the
new embedding algorithm and extracting algorithm
are presented. While embedding the secret message in
over image file, the starting embedded pixel is
chosen according to public shared key between sender
and receiver. The original cover image and embedded
image with secret message are analyzed with PSNR
values and SNR values to achieve security. The
ng embedded image shows the acceptable
PSNR and SNR values while comparing with the
original cover image. The proposed system can help
the information exchanging system over
Image Steganography, LSB, Data hiding,
Significant advancements in digital imaging during
the last decade have added a few innovative
dimensions to the field of image processing [1]. The
word steganography is derived from the Greek words
grafia meaning writing [2].
In image steganography the information is hidden
exclusively in images. It is one of the effective means
of data hiding that protects data from unauthorized or
unwanted disclosure and can be used in various field
such as medicines, research, defense and intelligence
for secret data storage, confidential communication,
protection of data from alteration and disclosure and
access control in digital distribution.
The original files can be referred to as cover text,
cover image, or cover audio. After inserting the secret
message, it is referred to as stego
key is used for hiding/encoding process to restrict
detection or extraction of the embedded data [2]. The
image obtained after insertion of message is called a
stego image. Insertion of secret message is done in
Least Significant Bit (LSB) of the image pixels in this
paper. Then the stego image formed is having a
message which is invisible to human eye. This means
that one cannot find the difference between the
original image and stego image. The secret message is
inserted by using an algorithm and the secret message
is obtained from stego image by using reverse
algorithm [4].
The organization and implementation of the paper is
as follows. The following section p
of Steganography. Then experimental results are
expressed and discussion and conclusion are at the
end.
II. STEGANOGRAPHY
Steganography is a process of secret communication
where a piece of information (a secret message) is
hidden into another piece of innocent looking
information, called a cover. The message is hidden
inside the cover in such a way that the very existence
of the secret information in the cover cannot be
estimated in any suspicion in the minds of the viewers
Research and Development (IJTSRD)
www.ijtsrd.com
Dec 2018
Dec 2018 Page: 394
or Information Security System
In image steganography the information is hidden
exclusively in images. It is one of the effective means
of data hiding that protects data from unauthorized or
unwanted disclosure and can be used in various field
cines, research, defense and intelligence
for secret data storage, confidential communication,
protection of data from alteration and disclosure and
access control in digital distribution.
The original files can be referred to as cover text,
or cover audio. After inserting the secret
message, it is referred to as stego-medium. A stego-
key is used for hiding/encoding process to restrict
detection or extraction of the embedded data [2]. The
image obtained after insertion of message is called a
stego image. Insertion of secret message is done in
Least Significant Bit (LSB) of the image pixels in this
paper. Then the stego image formed is having a
message which is invisible to human eye. This means
that one cannot find the difference between the
riginal image and stego image. The secret message is
inserted by using an algorithm and the secret message
is obtained from stego image by using reverse
The organization and implementation of the paper is
as follows. The following section presents the process
of Steganography. Then experimental results are
expressed and discussion and conclusion are at the
STEGANOGRAPHY
Steganography is a process of secret communication
where a piece of information (a secret message) is
ther piece of innocent looking
information, called a cover. The message is hidden
inside the cover in such a way that the very existence
of the secret information in the cover cannot be
estimated in any suspicion in the minds of the viewers
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
[1]. Steganography is the art and science of
communicating in a way which hides the existence of
the communication. Steganography plays an
important role in information security. It is the art of
invisible communication by concealing information
inside other information.
A digital image is described using a 2-D matrix of the
color intestines at each grid point (i.e. pixel).
Typically gray images use 8 bits, whereas colored
utilizes 24 bits to describe the color model, such as
RGB model. The Steganography system which us
an image as the cover, there are several techniques to
conceal information inside cover image. The spatial
domain techniques manipulate the cover image pixel
bit values to embed the secret information. The secret
bits are written directly to the cover image pixel bytes.
Consequently, the spatial domain techniques are
simple and easy to implement. The Least Significant
Bit (LSB) is one of the main techniques in spatial
domain image Steganography. The LSB is the lowest
significant bit in the byte value of the image pixel.
The LSB based image steganography embeds the
secret in the least significant bits of pixel values of the
cover image (CVR) [7]. One of the common
techniques is based on manipulating Least Significant
Bit (LSB) planes by directly replacing the LSBs of the
cover-image with the message bits. LSB methods
typically achieve high capacity [6]. LSB substitution
is also the process of adjusting the least significant bit
pixels of the carrier image [8].
The concept of LSB Embedding is simple. It exp
the fact that the level of precision in many image
formats is far greater than that perceivable by average
human vision. Therefore, an altered image with slight
variations in its colors will be indistinguishable from
the original by a human being, just by looking at it. In
conventional LSB technique, which requires eight
bytes of pixels to store 1byte of secret data but in
proposed LSB technique, just four bytes of pixels are
sufficient to hold one message byte. Rest of the bits in
the pixels remains the same.
III. LEAST SIGNIFICANT BIT (LSB)
TECHNIQUE
In Least Significant Bit Algorithm, both secret
message and the cover image are firstly converted
from their pixel format to binary. And the Least
Significant Bit of the image is substituted with the bit
of the secret message to be transferred so as to reflect
the message that needs to be hidden. The bits of the
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
phy is the art and science of
communicating in a way which hides the existence of
the communication. Steganography plays an
important role in information security. It is the art of
invisible communication by concealing information
D matrix of the
color intestines at each grid point (i.e. pixel).
Typically gray images use 8 bits, whereas colored
utilizes 24 bits to describe the color model, such as
RGB model. The Steganography system which uses
an image as the cover, there are several techniques to
conceal information inside cover image. The spatial
domain techniques manipulate the cover image pixel
bit values to embed the secret information. The secret
mage pixel bytes.
Consequently, the spatial domain techniques are
simple and easy to implement. The Least Significant
Bit (LSB) is one of the main techniques in spatial
domain image Steganography. The LSB is the lowest
the image pixel.
The LSB based image steganography embeds the
secret in the least significant bits of pixel values of the
cover image (CVR) [7]. One of the common
techniques is based on manipulating Least Significant
the LSBs of the
image with the message bits. LSB methods
typically achieve high capacity [6]. LSB substitution
is also the process of adjusting the least significant bit
The concept of LSB Embedding is simple. It exploits
the fact that the level of precision in many image
formats is far greater than that perceivable by average
human vision. Therefore, an altered image with slight
variations in its colors will be indistinguishable from
st by looking at it. In
conventional LSB technique, which requires eight
bytes of pixels to store 1byte of secret data but in
proposed LSB technique, just four bytes of pixels are
sufficient to hold one message byte. Rest of the bits in
LEAST SIGNIFICANT BIT (LSB)
In Least Significant Bit Algorithm, both secret
message and the cover image are firstly converted
from their pixel format to binary. And the Least
Significant Bit of the image is substituted with the bit
the secret message to be transferred so as to reflect
the message that needs to be hidden. The bits of the
secret message replace each of the colors of the Least
Significant Bit of the Image [9]. Every pixel in an
image indicates a color and, the each ima
up of pixels [5].
The right-most value is the LSB value of related
image pixel sequence. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
to a 1 does not have a huge impact on the final result.
Each 8-bit binary sequence is used for expressing the
color of a pixel for an image, so changing the LSB
value from a 0 to 1 does not impose a major change
and it is unlikely to be noticed by an observer. In fact,
the LSBs of each pixel value could be potentially
modified, and the changes would still not be visible.
This provides an enormous amount of redundancy in
the image data, which means that we can effectively
substitute the LSBs of the image data, with each bit of
the message data until the entire message has been
embedded. This is meant by Least Significant Bit
Substitution Method.
One of the earliest stego-systems to surface was those
referred to as Least Significant Bit Substitution
techniques, socalled because of how the message data
is embedded within a cover image c. In computer
science, the term Least Significant Bit (LSB) refers to
the smallest (right-most) bit of
structure of binary is such that each
be either a 0 or a 1, often thought of as off
respectively. Starting from the right, the value (if on)
denotes a 1. The value to its left (if on) denotes a 2,
and so on where the values double each time.
This value essentially determines whether the total
sum is odd or even. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
to a 1 does not have a huge impact on the final f
it will only ever change by +1 at most. If we now
think of each 8-bit binary sequence as a means of
expressing the colour of a pixel for an image, it
should be clear to see that changing the LSB value
from a 0 to a 1 will only change the colour by +
change that is unlikely to be noticed with the naked
eye. In fact, the LSBs of each pixel value could
potentially be modified, and the changes would still
not be visible. This highlights a huge amount of
redundancy in the image data, and means that w
effectively substitute the LSBs of the image data, with
each bit of the message data until the entire message
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 395
secret message replace each of the colors of the Least
Significant Bit of the Image [9]. Every pixel in an
image indicates a color and, the each image is made
most value is the LSB value of related
image pixel sequence. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
e a huge impact on the final result.
bit binary sequence is used for expressing the
color of a pixel for an image, so changing the LSB
value from a 0 to 1 does not impose a major change
and it is unlikely to be noticed by an observer. In fact,
SBs of each pixel value could be potentially
modified, and the changes would still not be visible.
This provides an enormous amount of redundancy in
the image data, which means that we can effectively
substitute the LSBs of the image data, with each bit of
the message data until the entire message has been
embedded. This is meant by Least Significant Bit
systems to surface was those
referred to as Least Significant Bit Substitution
because of how the message data
within a cover image c. In computer
Significant Bit (LSB) refers to
most) bit of a binary sequence. The
structure of binary is such that each integer may only
r a 0 or a 1, often thought of as off and on
Starting from the right, the value (if on)
value to its left (if on) denotes a 2,
double each time.
This value essentially determines whether the total
sum is odd or even. If the LSB is a 1, then the total
will be an odd number, and if 0, it will be an even
number. However, changing the LSB value from a 0
to a 1 does not have a huge impact on the final figure;
it will only ever change by +1 at most. If we now
bit binary sequence as a means of
expressing the colour of a pixel for an image, it
should be clear to see that changing the LSB value
from a 0 to a 1 will only change the colour by +1 - a
change that is unlikely to be noticed with the naked
eye. In fact, the LSBs of each pixel value could
potentially be modified, and the changes would still
not be visible. This highlights a huge amount of
redundancy in the image data, and means that we can
effectively substitute the LSBs of the image data, with
each bit of the message data until the entire message
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
has been embedded. This is meant by Least
Significant Bit Substitution. Now if the message is
embedded as is into LSB of the cover image, th
resultant structure in the LSB plane of the stego
image would clearly be a giveaway [3]. The
embedding algorithm at the sender side and extracting
algorithm at the receiver side are presented as follows:
A. The embedding algorithm at the sender side
Step (1) : Get the input cover image and secret
message.
Step (2) : Accept the stego-key from the user and
calculate average value of them.
Step (3) : Convert each character of secret message
and each LSB bit of cover image (R
channel) from the position of
average of stego-key.
Step (4) : Substitute the LSB bit of cover image (R
channel) with binary values of secret
IV. IMPLEMENTATION OF PROPOSED SYSTEM
In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of
secret message and each pixel of cover bmp image are converted into binary values. The user has to input
stego-key as the password of stego-key is u
Figure1. Overview of proposed system
After inserting secret message into cover image file,
the resulting stego-image is sent to the receiver
through the desired communication channel. The
above figure 1 shows the overall system design of
proposed system.
While inserting a binary bit of secret message into
cover image, each pixel value of cover image, which
is in decimal in value, is converted into binary values
as shown in figure 2. In this case, there are R, G, B
channel values of each pixel of cover image, but only
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
has been embedded. This is meant by Least
Significant Bit Substitution. Now if the message is
embedded as is into LSB of the cover image, then the
resultant structure in the LSB plane of the stego-
image would clearly be a giveaway [3]. The
embedding algorithm at the sender side and extracting
algorithm at the receiver side are presented as follows:
The embedding algorithm at the sender side
: Get the input cover image and secret
key from the user and
calculate average value of them.
: Convert each character of secret message
and each LSB bit of cover image (R-
channel) from the position of calculated
: Substitute the LSB bit of cover image (R-
channel) with binary values of secret
message with respect to the starting point
until the end of secret message.
Step (5) : Insert the end character value at the end of
secret message.
Step (6) : Calculate the PSNR, SNR of original and
resulting images.
Step (7) : Send a stego-image to the receiver.
B. The extracting algorithm at the receiver side
Step (1) : Get the input stego
calculate average valu
Step (2) : Load the stego-image that is sent from the
sender.
Step (3) : Extract each of LSB bit from the stego
image until to find out the end bit.
Step (4) : Reconstruct the collecting LSB bits from
the stego-image.
Step (5) : Transform the LSB bits to correspondent
characters.
IMPLEMENTATION OF PROPOSED SYSTEM
In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of
secret message and each pixel of cover bmp image are converted into binary values. The user has to input
key is used to embed the secret message in a cover file.
Figure1. Overview of proposed system
After inserting secret message into cover image file,
image is sent to the receiver
on channel. The
above figure 1 shows the overall system design of
While inserting a binary bit of secret message into
cover image, each pixel value of cover image, which
is in decimal in value, is converted into binary values
figure 2. In this case, there are R, G, B
channel values of each pixel of cover image, but only
the R-channge LSB bit values are used to substitute.
Similarly each character of secret message is
converted from decimal value to binary value. Finally
the converted binary value of secret message is
substituted into each LSB bit of R
image until the end of secret message. In this case the
starting substitution point is chosen according to the
input stego-key. The figure 3 illustrates the
substitution of secret message into each LSB bit of
cover image.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 396
message with respect to the starting point
until the end of secret message.
: Insert the end character value at the end of
: Calculate the PSNR, SNR of original and
image to the receiver.
The extracting algorithm at the receiver side
: Get the input stego-key from the userand
calculate average value of them.
image that is sent from the
: Extract each of LSB bit from the stego-
image until to find out the end bit.
: Reconstruct the collecting LSB bits from
: Transform the LSB bits to correspondent
In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of
secret message and each pixel of cover bmp image are converted into binary values. The user has to input
sed to embed the secret message in a cover file.
channge LSB bit values are used to substitute.
Similarly each character of secret message is
converted from decimal value to binary value. Finally
verted binary value of secret message is
substituted into each LSB bit of R-channel of cover
image until the end of secret message. In this case the
starting substitution point is chosen according to the
key. The figure 3 illustrates the
tution of secret message into each LSB bit of
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure2. Pixel representation and binary values
Figure 3.LSB substitution algorithm of proposed
system
While defining the starting point of embedding LSB,
the stego-key is firstly collected from the user. The
summation of the ASCII value of each character of
stego-key is calculated and then the average of those
characters value is computed. While substituting the
secret message into LSB of cover image, the first LSB
position is chosen according to the calculated average
value of input stego-key characters. Then the
substitution processing will continue until the end of
secret message.
V. EXPERIMENTAL RESULTS AND
ANALYSIS
The following figure 4 shows the required processes
at the sender side, in this case, the user has to input
the stego-key which is already shared with the
receiver side. In this research work, the cover image
type of bmp is used to evaluate.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
2. Pixel representation and binary values
Figure 3.LSB substitution algorithm of proposed
While defining the starting point of embedding LSB,
from the user. The
summation of the ASCII value of each character of
key is calculated and then the average of those
characters value is computed. While substituting the
secret message into LSB of cover image, the first LSB
ng to the calculated average
key characters. Then the
substitution processing will continue until the end of
EXPERIMENTAL RESULTS AND
The following figure 4 shows the required processes
at the sender side, in this case, the user has to input
key which is already shared with the
receiver side. In this research work, the cover image
Figure 4.Sender side of proposed system
There are three portions at the sender side to accept as
shown in figure 4.The first one is choosing the input
cover image file, and then inputting the desired secret
message and finally stego-key. The stego
important to substitute and to extract secret message
at both sides. The secret message should be arbitrary,
the size of secret message can increase the processing
time of substitution into the cover image.
The following figure 5 shows the overall processes at
the receiver side. The first important one is stego
which is used to evaluate the average value of input
characters. After calculating the average of input
characters, the proposed system can point
starting point to extract the secret message. The
second important one is the sent stego
must be in bmp file format only. Finally the proposed
system can successfully extract the original secret
message with correct stego-key.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 397
ender side of proposed system
There are three portions at the sender side to accept as
shown in figure 4.The first one is choosing the input
cover image file, and then inputting the desired secret
key. The stego-key is very
tant to substitute and to extract secret message
at both sides. The secret message should be arbitrary,
the size of secret message can increase the processing
time of substitution into the cover image.
The following figure 5 shows the overall processes at
the receiver side. The first important one is stego-key
which is used to evaluate the average value of input
characters. After calculating the average of input
characters, the proposed system can point out the
starting point to extract the secret message. The
second important one is the sent stego-image which
must be in bmp file format only. Finally the proposed
system can successfully extract the original secret
key.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure5. Receiver side of proposed system
When the proposed system evaluates, the original
cover image is changed according to the input secret
message and stego-key. The PSNR and SNR values of
original and resulting images are calculated and
compared in the following table 1. The resulting
PSNR and SNR values of substituted cover image
show a little bit changes with the original ones. In this
case, different six bmp cover images are used to
implement the proposed system.
In order to measure the performance of t
compression algorithms two performance parameters
are used in this system.
 Signal to Noise Ratio (SNR)
 Peak Signal to Noise Ratio (PSNR)
A. Signal to Noise Ratio
The signal to noise ratio (SNR) is a technical term
used to characterize the quality of the signal detection
of a measuring system. In this case, a system uses a
Table1. The comparison results of PSNR and SNR values between original and embedded images
No. Types of Images
Original Image
PSNR
1 flower.bmp 22.2474
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
Receiver side of proposed system
evaluates, the original
cover image is changed according to the input secret
key. The PSNR and SNR values of
original and resulting images are calculated and
lowing table 1. The resulting
PSNR and SNR values of substituted cover image
show a little bit changes with the original ones. In this
case, different six bmp cover images are used to
In order to measure the performance of the image
compression algorithms two performance parameters
The signal to noise ratio (SNR) is a technical term
used to characterize the quality of the signal detection
of a measuring system. In this case, a system uses a
noise “salt and pepper” with the original cover
images.
B. Peak Signal to Noise Ratio (PSNR)
Mean Squared Error (MSE) is defined as the square of
differences in the pixel values between the
corresponding pixels of the two images. The mean
square error (MSE) of N * M size image is given by
the following equation (1),
MSE= ΣM, N [I1 (m, n) –I2 (m, n)]
M &N -number of rows and columns in the input
images.
PSNR (peak signal to noise ratio)
to-noise ratio often abbreviated PSNR, is an
engineering name, for the ratio between the maximum
possible power of a signal and the power of
corrupting noise that affects the fidelity.
The peak error between the compressed image and
original image is measured in terms of PSNR. The
higher value of PSNR indicates higher quality of
image. To calculate PSNR, MSE is first computed.
PSNR value can be derived as in equation (2). Here
‘O’ and ‘D’ are the original and the distorted image
pixel values (binary), respectively, to be compared,
and the image size is M x N.







MSE
MAX
PSNR
2
10log10
Here, MAX is the peak value of the pixels in an image.
MAX is 255 when pixels are presented in an 8
bitformat. Theoretically, the higher the PSNR value
is, the better the image processing is; however,
practically, there are some problems reported in the
literature about the use of the PSNR for image quality
assessment.
1. The comparison results of PSNR and SNR values between original and embedded images
Original Image Embedded Image
Image Size Resulting Images
SNR PSNR SNR
17.5806 22.2568 17.59 255x256
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 398
noise “salt and pepper” with the original cover
Peak Signal to Noise Ratio (PSNR)
an Squared Error (MSE) is defined as the square of
differences in the pixel values between the
corresponding pixels of the two images. The mean
square error (MSE) of N * M size image is given by
I2 (m, n)] 2 / (M*N) (1)
number of rows and columns in the input
PSNR (peak signal to noise ratio) -PSNR Peak signal-
noise ratio often abbreviated PSNR, is an
engineering name, for the ratio between the maximum
possible power of a signal and the power of
corrupting noise that affects the fidelity.
tween the compressed image and
original image is measured in terms of PSNR. The
higher value of PSNR indicates higher quality of
image. To calculate PSNR, MSE is first computed.
PSNR value can be derived as in equation (2). Here
nal and the distorted image
pixel values (binary), respectively, to be compared,
(2)
is the peak value of the pixels in an image.
is 255 when pixels are presented in an 8-
bitformat. Theoretically, the higher the PSNR value
the better the image processing is; however,
there are some problems reported in the
literature about the use of the PSNR for image quality
1. The comparison results of PSNR and SNR values between original and embedded images
Resulting Images
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
2 mandrill.bmp 21.8341
3 lenna.bmp 21.9866
4 peppers.bmp 21.9163
5 sails.bmp 21.9336
6 boy.bmp 21.9816
VI. DISCUSSION AND CONCLUSION
In this research work, proposed LSB based
steganography for embedding and extracting
algorithms are presented. LSB based steganography
embed the text message in LSB of the pixels of cover
image according to the input stego-key. This paper
also compares the results of PSNR values and SNR
values of original and resulting cover images. The
main goal of this paper is to show how secret image
can be embedded and how it can be sent through the
internet by fooling grabbers.
Many problems can be encountered when important
data is transferred over the public communication
media. A safe and secure procedure is needed to
transfer them easily. For this purpose simple image
hiding techniques are used and the quality of stego
images is also improved by using LSB substitution
algorithms. So the hackers may not estimate secret
message with resultingstego image. The experimental
results show that the stego image and the cover image
remain more or less identical which is the main focus
of this paper. This means that a secret message can be
sent to the destination without changes.
PSNR and SNR values of original and embedded
images are compared and analyzed. The comparison
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
16.6596 21.8459 16.67 512x512
16.8408 22.0123 16.87 220x220
12.4611 21.9112 12.46 512x512
16.9037 22.0068 16.98 768x512
17.1659 21.9232 17.11 768x512
DISCUSSION AND CONCLUSION
In this research work, proposed LSB based
steganography for embedding and extracting
algorithms are presented. LSB based steganography
embed the text message in LSB of the pixels of cover
key. This paper
also compares the results of PSNR values and SNR
values of original and resulting cover images. The
main goal of this paper is to show how secret image
can be embedded and how it can be sent through the
Many problems can be encountered when important
over the public communication
media. A safe and secure procedure is needed to
transfer them easily. For this purpose simple image
hiding techniques are used and the quality of stego
images is also improved by using LSB substitution
rs may not estimate secret
message with resultingstego image. The experimental
results show that the stego image and the cover image
remain more or less identical which is the main focus
of this paper. This means that a secret message can be
stination without changes. Finally the
PSNR and SNR values of original and embedded
images are compared and analyzed. The comparison
results show that the embedded resulting image is
totally identical with the original ones.
As the further work, other color cover image types
such as jpg, tiff, png and so on will be used to
compare with those results. Another better embedding
and extracting algorithms will be used to implement
it. Also not only secret text message but also secret
image or data will be used to embed in a cover file. It
is expected to find better technique and algorithms to
hide more data in a cover image.
Reference
1. M. Mishra, Department of Information and
Communication Technology and Dr. M.C.
Adhikary, Department of Applied Physics and
Ballistics, “An Easy Yet Effective Method for
Detecting Spatial Domain LSB Steganography”,
International Journal of Computer Science and
Business Informatics, vol.8, No.1 Dec 2013.
2. K. J. Devi, “A Secure Image Steganography using
LSB Technique and Pseudo Ran
Technique”, Department of Computer Science and
Engineering National Institute of Technology
Rourkela Odisha, Bachelor Thesis, May 2013.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 399
results show that the embedded resulting image is
totally identical with the original ones.
color cover image types
such as jpg, tiff, png and so on will be used to
compare with those results. Another better embedding
and extracting algorithms will be used to implement
it. Also not only secret text message but also secret
ed to embed in a cover file. It
is expected to find better technique and algorithms to
hide more data in a cover image.
M. Mishra, Department of Information and
Communication Technology and Dr. M.C.
Adhikary, Department of Applied Physics and
allistics, “An Easy Yet Effective Method for
Detecting Spatial Domain LSB Steganography”,
International Journal of Computer Science and
Business Informatics, vol.8, No.1 Dec 2013.
K. J. Devi, “A Secure Image Steganography using
LSB Technique and Pseudo Random Encoding
Technique”, Department of Computer Science and
Engineering National Institute of Technology-
Rourkela Odisha, Bachelor Thesis, May 2013.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
3. R. Chandramouli, Msync lab, Stevens Institute of
Technology, Dept. of Electrical and Computer
Engineering, Hoboken and N. Memon,
Polytechnic University, Computer Science
Department, Brooklyn, “Analysis of LSB Based
Image Steganography Techniques, IEEE 2001.
4. A. Khurana, Dept of Electronic, Punjab, India and
B. M. Mehta, Dept of ECE, Punjab, India,
“Comparison of LSB and MSB based Image
Steganography, International Journal of Computer
Science and Technology, Vol. 3 Issue 3, July
2012.
5. R. R. Krupa, Department of Information
Technology, the Standard Fireworks, Rajaratnam
College for Women, Sivakasi, Tamilnadu,
“An Overview of Image Hiding Techniquess in
Image Processing”, The SIJ Transaction of
Computer Science Engineering and its
Applications (CSEA), Vol.2, No.2, March
2014.
6. C. Chan, Department of Computer Engineering
and Information Technology, City University of
Hong Kong, Hong Kong, “Hiding Data in Images
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018
R. Chandramouli, Msync lab, Stevens Institute of
Technology, Dept. of Electrical and Computer
Hoboken and N. Memon,
Polytechnic University, Computer Science
Department, Brooklyn, “Analysis of LSB Based
Image Steganography Techniques, IEEE 2001.
A. Khurana, Dept of Electronic, Punjab, India and
B. M. Mehta, Dept of ECE, Punjab, India,
LSB and MSB based Image
Steganography, International Journal of Computer
Science and Technology, Vol. 3 Issue 3, July-Sept
R. R. Krupa, Department of Information
Technology, the Standard Fireworks, Rajaratnam
College for Women, Sivakasi, Tamilnadu, India,
“An Overview of Image Hiding Techniquess in
Image Processing”, The SIJ Transaction of
Computer Science Engineering and its
Applications (CSEA), Vol.2, No.2, March-April
C. Chan, Department of Computer Engineering
ty University of
Hong Kong, Hong Kong, “Hiding Data in Images
by Simple LSB Substitution”, the Journal of the
Pattern Recognition Society, August 2003.
7. B, S. Champakamala, K. Padmini, K. D. Radhika,
Department of TCE, Don Bosco Institute of
Technology, Bangalore, India, “Least Significant
Bit Algorithm for Image Steganography”,
International Journal of Advanced Computer
Technology, Vol.3, No.4, August 2014.
8. C, R, Ravinder, A, R, Roja, Department of Master
of Computer Appliccations, Teegala Krishna
Reddy Engineering College, Medbowli, Meerpet,
Hyderabad, “The Process of Encoding and
Decoding of Image Steganography using LSB
Algorithm”, International Journal of Computer
Science and Engineering Technology”, Vol.2,
Issue 11, Nov 2012.
9. 9. O. Osunade, and I. A. Ga
Computer Science, University of Ibadan, Ibadan,
“Enhancing the Least Significant Bit (LSB)
Algorithm for Steganography”, International
Journal of Computer Application, Vol. 149, No.3,
Sept 2016.
Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Dec 2018 Page: 400
by Simple LSB Substitution”, the Journal of the
Pattern Recognition Society, August 2003.
B, S. Champakamala, K. Padmini, K. D. Radhika,
Department of TCE, Don Bosco Institute of
galore, India, “Least Significant
Bit Algorithm for Image Steganography”,
International Journal of Advanced Computer
Technology, Vol.3, No.4, August 2014.
C, R, Ravinder, A, R, Roja, Department of Master
of Computer Appliccations, Teegala Krishna
ineering College, Medbowli, Meerpet,
Hyderabad, “The Process of Encoding and
Decoding of Image Steganography using LSB
Algorithm”, International Journal of Computer
Science and Engineering Technology”, Vol.2,
O. Osunade, and I. A. Ganiyu, Department of
Computer Science, University of Ibadan, Ibadan,
“Enhancing the Least Significant Bit (LSB)
Algorithm for Steganography”, International
Journal of Computer Application, Vol. 149, No.3,

More Related Content

What's hot

Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
ijtsrd
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
Abhishek Dhara
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 
Ijetr042105
Ijetr042105Ijetr042105
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
ijseajournal
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
D010312230
D010312230D010312230
D010312230
IOSR Journals
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
IJERA Editor
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
sipij
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
Junus Sinuraya
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
IRJESJOURNAL
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
IOSR Journals
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
International Journal of Science and Research (IJSR)
 

What's hot (18)

Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
D010312230
D010312230D010312230
D010312230
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 

Similar to LSB Based Image Steganography for Information Security System

A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
IJERA Editor
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
ijtsrd
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
IJNSA Journal
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
theijes
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
ijtsrd
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
IJCSIS Research Publications
 
Stegnography
StegnographyStegnography
Stegnography
keerthi505
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
IJARIIE JOURNAL
 
review.pptx
review.pptxreview.pptx
review.pptx
TechNest1
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
Nathan Mathis
 
K0815660
K0815660K0815660
K0815660
IOSR Journals
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 

Similar to LSB Based Image Steganography for Information Security System (20)

A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
Stegnography
StegnographyStegnography
Stegnography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
review.pptx
review.pptxreview.pptx
review.pptx
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 
K0815660
K0815660K0815660
K0815660
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docxTurkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Eticketing.co
 
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdfParis 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
Eticketing.co
 
Sportr pitch deck for our saas based platform
Sportr pitch deck for our saas based platformSportr pitch deck for our saas based platform
Sportr pitch deck for our saas based platform
NathanielMDuncan
 
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
Arturo Pacheco Alvarez
 
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docx
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docxEuro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docx
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docx
Eticketing.co
 
MESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdfMESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdf
Social Samosa
 
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdf
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdfGeorgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdf
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdf
Eticketing.co
 
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Eticketing.co
 
Turkey vs Georgia Prospects and Challenges in Euro Cup Germany.docx
Turkey vs Georgia Prospects and Challenges in Euro Cup Germany.docxTurkey vs Georgia Prospects and Challenges in Euro Cup Germany.docx
Turkey vs Georgia Prospects and Challenges in Euro Cup Germany.docx
Eticketing.co
 
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
Arturo Pacheco Alvarez
 
Euro 2024 Predictions - Group Stage Outcomes
Euro 2024 Predictions - Group Stage OutcomesEuro 2024 Predictions - Group Stage Outcomes
Euro 2024 Predictions - Group Stage Outcomes
Select Distinct Limited
 
Hesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next GenerationHesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi 
 
Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...
Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...
Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...
Eticketing.co
 
Tennis rules and techniques with information
Tennis rules and techniques with informationTennis rules and techniques with information
Tennis rules and techniques with information
mohsintariq167876
 
一比一原版(Curtin毕业证)科廷大学毕业证如何办理
一比一原版(Curtin毕业证)科廷大学毕业证如何办理一比一原版(Curtin毕业证)科廷大学毕业证如何办理
一比一原版(Curtin毕业证)科廷大学毕业证如何办理
apobqx
 
Psaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success StoryPsaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis
 
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Eticketing.co
 
The most promising young Players to watch during Euro 2024.docx
The most promising young Players to watch during Euro 2024.docxThe most promising young Players to watch during Euro 2024.docx
The most promising young Players to watch during Euro 2024.docx
Euro Cup 2024 Tickets
 
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Eticketing.co
 
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docxLuciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
Euro Cup 2024 Tickets
 

Recently uploaded (20)

Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docxTurkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
 
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdfParis 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
 
Sportr pitch deck for our saas based platform
Sportr pitch deck for our saas based platformSportr pitch deck for our saas based platform
Sportr pitch deck for our saas based platform
 
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
 
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docx
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docxEuro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docx
Euro 2024 Belgium's Rebirth the New Generation Match the Golden Era.docx
 
MESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdfMESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdf
 
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdf
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdfGeorgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdf
Georgia vs Portugal Euro Cup 2024 Clash Unites a Nation Amid Turmoil.pdf
 
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
 
Turkey vs Georgia Prospects and Challenges in Euro Cup Germany.docx
Turkey vs Georgia Prospects and Challenges in Euro Cup Germany.docxTurkey vs Georgia Prospects and Challenges in Euro Cup Germany.docx
Turkey vs Georgia Prospects and Challenges in Euro Cup Germany.docx
 
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
 
Euro 2024 Predictions - Group Stage Outcomes
Euro 2024 Predictions - Group Stage OutcomesEuro 2024 Predictions - Group Stage Outcomes
Euro 2024 Predictions - Group Stage Outcomes
 
Hesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next GenerationHesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next Generation
 
Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...
Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...
Switzerland vs Germany At UEFA Euro 2024 the Full squad, preview, match sched...
 
Tennis rules and techniques with information
Tennis rules and techniques with informationTennis rules and techniques with information
Tennis rules and techniques with information
 
一比一原版(Curtin毕业证)科廷大学毕业证如何办理
一比一原版(Curtin毕业证)科廷大学毕业证如何办理一比一原版(Curtin毕业证)科廷大学毕业证如何办理
一比一原版(Curtin毕业证)科廷大学毕业证如何办理
 
Psaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success StoryPsaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success Story
 
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
 
The most promising young Players to watch during Euro 2024.docx
The most promising young Players to watch during Euro 2024.docxThe most promising young Players to watch during Euro 2024.docx
The most promising young Players to watch during Euro 2024.docx
 
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
 
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docxLuciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
Luciano Spalletti Leads Italy's Transition at UEFA Euro 2024.docx
 

LSB Based Image Steganography for Information Security System

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 - 6470 @ IJTSRD | Available Online @ www.ijtsrd.com LSB Based Image Steganography Professor, Kayah State, Republic of t ABSTRACT Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap (*.bmp) image is used as a cover image file to implement the proposed system. The detail Least Significant Bit (LSB) based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Keywords: Image Steganography, LSB, Data hiding, information security, PSNR I. INTRODUCTION: Significant advancements in digital imaging during the last decade have added a few innovative dimensions to the field of image processing [1]. The word steganography is derived from the Greek words stegos meaning cover and grafia meaning writing [2]. International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com 6470 | Volume - 3 | Issue – 1 | Nov – Dec 2018 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 LSB Based Image Steganography for Information Security System Aung Myint Aye , University of Computer Studies, Loikaw, Republic of the Union of Myanmar, Myanmar Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a over image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and Bitmap (*.bmp) image is used cover image file to implement the proposed system. The detail Least Significant Bit (LSB) based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in over image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The ng embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over Image Steganography, LSB, Data hiding, Significant advancements in digital imaging during the last decade have added a few innovative dimensions to the field of image processing [1]. The word steganography is derived from the Greek words grafia meaning writing [2]. In image steganography the information is hidden exclusively in images. It is one of the effective means of data hiding that protects data from unauthorized or unwanted disclosure and can be used in various field such as medicines, research, defense and intelligence for secret data storage, confidential communication, protection of data from alteration and disclosure and access control in digital distribution. The original files can be referred to as cover text, cover image, or cover audio. After inserting the secret message, it is referred to as stego key is used for hiding/encoding process to restrict detection or extraction of the embedded data [2]. The image obtained after insertion of message is called a stego image. Insertion of secret message is done in Least Significant Bit (LSB) of the image pixels in this paper. Then the stego image formed is having a message which is invisible to human eye. This means that one cannot find the difference between the original image and stego image. The secret message is inserted by using an algorithm and the secret message is obtained from stego image by using reverse algorithm [4]. The organization and implementation of the paper is as follows. The following section p of Steganography. Then experimental results are expressed and discussion and conclusion are at the end. II. STEGANOGRAPHY Steganography is a process of secret communication where a piece of information (a secret message) is hidden into another piece of innocent looking information, called a cover. The message is hidden inside the cover in such a way that the very existence of the secret information in the cover cannot be estimated in any suspicion in the minds of the viewers Research and Development (IJTSRD) www.ijtsrd.com Dec 2018 Dec 2018 Page: 394 or Information Security System In image steganography the information is hidden exclusively in images. It is one of the effective means of data hiding that protects data from unauthorized or unwanted disclosure and can be used in various field cines, research, defense and intelligence for secret data storage, confidential communication, protection of data from alteration and disclosure and access control in digital distribution. The original files can be referred to as cover text, or cover audio. After inserting the secret message, it is referred to as stego-medium. A stego- key is used for hiding/encoding process to restrict detection or extraction of the embedded data [2]. The image obtained after insertion of message is called a stego image. Insertion of secret message is done in Least Significant Bit (LSB) of the image pixels in this paper. Then the stego image formed is having a message which is invisible to human eye. This means that one cannot find the difference between the riginal image and stego image. The secret message is inserted by using an algorithm and the secret message is obtained from stego image by using reverse The organization and implementation of the paper is as follows. The following section presents the process of Steganography. Then experimental results are expressed and discussion and conclusion are at the STEGANOGRAPHY Steganography is a process of secret communication where a piece of information (a secret message) is ther piece of innocent looking information, called a cover. The message is hidden inside the cover in such a way that the very existence of the secret information in the cover cannot be estimated in any suspicion in the minds of the viewers
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com [1]. Steganography is the art and science of communicating in a way which hides the existence of the communication. Steganography plays an important role in information security. It is the art of invisible communication by concealing information inside other information. A digital image is described using a 2-D matrix of the color intestines at each grid point (i.e. pixel). Typically gray images use 8 bits, whereas colored utilizes 24 bits to describe the color model, such as RGB model. The Steganography system which us an image as the cover, there are several techniques to conceal information inside cover image. The spatial domain techniques manipulate the cover image pixel bit values to embed the secret information. The secret bits are written directly to the cover image pixel bytes. Consequently, the spatial domain techniques are simple and easy to implement. The Least Significant Bit (LSB) is one of the main techniques in spatial domain image Steganography. The LSB is the lowest significant bit in the byte value of the image pixel. The LSB based image steganography embeds the secret in the least significant bits of pixel values of the cover image (CVR) [7]. One of the common techniques is based on manipulating Least Significant Bit (LSB) planes by directly replacing the LSBs of the cover-image with the message bits. LSB methods typically achieve high capacity [6]. LSB substitution is also the process of adjusting the least significant bit pixels of the carrier image [8]. The concept of LSB Embedding is simple. It exp the fact that the level of precision in many image formats is far greater than that perceivable by average human vision. Therefore, an altered image with slight variations in its colors will be indistinguishable from the original by a human being, just by looking at it. In conventional LSB technique, which requires eight bytes of pixels to store 1byte of secret data but in proposed LSB technique, just four bytes of pixels are sufficient to hold one message byte. Rest of the bits in the pixels remains the same. III. LEAST SIGNIFICANT BIT (LSB) TECHNIQUE In Least Significant Bit Algorithm, both secret message and the cover image are firstly converted from their pixel format to binary. And the Least Significant Bit of the image is substituted with the bit of the secret message to be transferred so as to reflect the message that needs to be hidden. The bits of the Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 phy is the art and science of communicating in a way which hides the existence of the communication. Steganography plays an important role in information security. It is the art of invisible communication by concealing information D matrix of the color intestines at each grid point (i.e. pixel). Typically gray images use 8 bits, whereas colored utilizes 24 bits to describe the color model, such as RGB model. The Steganography system which uses an image as the cover, there are several techniques to conceal information inside cover image. The spatial domain techniques manipulate the cover image pixel bit values to embed the secret information. The secret mage pixel bytes. Consequently, the spatial domain techniques are simple and easy to implement. The Least Significant Bit (LSB) is one of the main techniques in spatial domain image Steganography. The LSB is the lowest the image pixel. The LSB based image steganography embeds the secret in the least significant bits of pixel values of the cover image (CVR) [7]. One of the common techniques is based on manipulating Least Significant the LSBs of the image with the message bits. LSB methods typically achieve high capacity [6]. LSB substitution is also the process of adjusting the least significant bit The concept of LSB Embedding is simple. It exploits the fact that the level of precision in many image formats is far greater than that perceivable by average human vision. Therefore, an altered image with slight variations in its colors will be indistinguishable from st by looking at it. In conventional LSB technique, which requires eight bytes of pixels to store 1byte of secret data but in proposed LSB technique, just four bytes of pixels are sufficient to hold one message byte. Rest of the bits in LEAST SIGNIFICANT BIT (LSB) In Least Significant Bit Algorithm, both secret message and the cover image are firstly converted from their pixel format to binary. And the Least Significant Bit of the image is substituted with the bit the secret message to be transferred so as to reflect the message that needs to be hidden. The bits of the secret message replace each of the colors of the Least Significant Bit of the Image [9]. Every pixel in an image indicates a color and, the each ima up of pixels [5]. The right-most value is the LSB value of related image pixel sequence. If the LSB is a 1, then the total will be an odd number, and if 0, it will be an even number. However, changing the LSB value from a 0 to a 1 does not have a huge impact on the final result. Each 8-bit binary sequence is used for expressing the color of a pixel for an image, so changing the LSB value from a 0 to 1 does not impose a major change and it is unlikely to be noticed by an observer. In fact, the LSBs of each pixel value could be potentially modified, and the changes would still not be visible. This provides an enormous amount of redundancy in the image data, which means that we can effectively substitute the LSBs of the image data, with each bit of the message data until the entire message has been embedded. This is meant by Least Significant Bit Substitution Method. One of the earliest stego-systems to surface was those referred to as Least Significant Bit Substitution techniques, socalled because of how the message data is embedded within a cover image c. In computer science, the term Least Significant Bit (LSB) refers to the smallest (right-most) bit of structure of binary is such that each be either a 0 or a 1, often thought of as off respectively. Starting from the right, the value (if on) denotes a 1. The value to its left (if on) denotes a 2, and so on where the values double each time. This value essentially determines whether the total sum is odd or even. If the LSB is a 1, then the total will be an odd number, and if 0, it will be an even number. However, changing the LSB value from a 0 to a 1 does not have a huge impact on the final f it will only ever change by +1 at most. If we now think of each 8-bit binary sequence as a means of expressing the colour of a pixel for an image, it should be clear to see that changing the LSB value from a 0 to a 1 will only change the colour by + change that is unlikely to be noticed with the naked eye. In fact, the LSBs of each pixel value could potentially be modified, and the changes would still not be visible. This highlights a huge amount of redundancy in the image data, and means that w effectively substitute the LSBs of the image data, with each bit of the message data until the entire message Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 395 secret message replace each of the colors of the Least Significant Bit of the Image [9]. Every pixel in an image indicates a color and, the each image is made most value is the LSB value of related image pixel sequence. If the LSB is a 1, then the total will be an odd number, and if 0, it will be an even number. However, changing the LSB value from a 0 e a huge impact on the final result. bit binary sequence is used for expressing the color of a pixel for an image, so changing the LSB value from a 0 to 1 does not impose a major change and it is unlikely to be noticed by an observer. In fact, SBs of each pixel value could be potentially modified, and the changes would still not be visible. This provides an enormous amount of redundancy in the image data, which means that we can effectively substitute the LSBs of the image data, with each bit of the message data until the entire message has been embedded. This is meant by Least Significant Bit systems to surface was those referred to as Least Significant Bit Substitution because of how the message data within a cover image c. In computer Significant Bit (LSB) refers to most) bit of a binary sequence. The structure of binary is such that each integer may only r a 0 or a 1, often thought of as off and on Starting from the right, the value (if on) value to its left (if on) denotes a 2, double each time. This value essentially determines whether the total sum is odd or even. If the LSB is a 1, then the total will be an odd number, and if 0, it will be an even number. However, changing the LSB value from a 0 to a 1 does not have a huge impact on the final figure; it will only ever change by +1 at most. If we now bit binary sequence as a means of expressing the colour of a pixel for an image, it should be clear to see that changing the LSB value from a 0 to a 1 will only change the colour by +1 - a change that is unlikely to be noticed with the naked eye. In fact, the LSBs of each pixel value could potentially be modified, and the changes would still not be visible. This highlights a huge amount of redundancy in the image data, and means that we can effectively substitute the LSBs of the image data, with each bit of the message data until the entire message
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com has been embedded. This is meant by Least Significant Bit Substitution. Now if the message is embedded as is into LSB of the cover image, th resultant structure in the LSB plane of the stego image would clearly be a giveaway [3]. The embedding algorithm at the sender side and extracting algorithm at the receiver side are presented as follows: A. The embedding algorithm at the sender side Step (1) : Get the input cover image and secret message. Step (2) : Accept the stego-key from the user and calculate average value of them. Step (3) : Convert each character of secret message and each LSB bit of cover image (R channel) from the position of average of stego-key. Step (4) : Substitute the LSB bit of cover image (R channel) with binary values of secret IV. IMPLEMENTATION OF PROPOSED SYSTEM In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of secret message and each pixel of cover bmp image are converted into binary values. The user has to input stego-key as the password of stego-key is u Figure1. Overview of proposed system After inserting secret message into cover image file, the resulting stego-image is sent to the receiver through the desired communication channel. The above figure 1 shows the overall system design of proposed system. While inserting a binary bit of secret message into cover image, each pixel value of cover image, which is in decimal in value, is converted into binary values as shown in figure 2. In this case, there are R, G, B channel values of each pixel of cover image, but only Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 has been embedded. This is meant by Least Significant Bit Substitution. Now if the message is embedded as is into LSB of the cover image, then the resultant structure in the LSB plane of the stego- image would clearly be a giveaway [3]. The embedding algorithm at the sender side and extracting algorithm at the receiver side are presented as follows: The embedding algorithm at the sender side : Get the input cover image and secret key from the user and calculate average value of them. : Convert each character of secret message and each LSB bit of cover image (R- channel) from the position of calculated : Substitute the LSB bit of cover image (R- channel) with binary values of secret message with respect to the starting point until the end of secret message. Step (5) : Insert the end character value at the end of secret message. Step (6) : Calculate the PSNR, SNR of original and resulting images. Step (7) : Send a stego-image to the receiver. B. The extracting algorithm at the receiver side Step (1) : Get the input stego calculate average valu Step (2) : Load the stego-image that is sent from the sender. Step (3) : Extract each of LSB bit from the stego image until to find out the end bit. Step (4) : Reconstruct the collecting LSB bits from the stego-image. Step (5) : Transform the LSB bits to correspondent characters. IMPLEMENTATION OF PROPOSED SYSTEM In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of secret message and each pixel of cover bmp image are converted into binary values. The user has to input key is used to embed the secret message in a cover file. Figure1. Overview of proposed system After inserting secret message into cover image file, image is sent to the receiver on channel. The above figure 1 shows the overall system design of While inserting a binary bit of secret message into cover image, each pixel value of cover image, which is in decimal in value, is converted into binary values figure 2. In this case, there are R, G, B channel values of each pixel of cover image, but only the R-channge LSB bit values are used to substitute. Similarly each character of secret message is converted from decimal value to binary value. Finally the converted binary value of secret message is substituted into each LSB bit of R image until the end of secret message. In this case the starting substitution point is chosen according to the input stego-key. The figure 3 illustrates the substitution of secret message into each LSB bit of cover image. Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 396 message with respect to the starting point until the end of secret message. : Insert the end character value at the end of : Calculate the PSNR, SNR of original and image to the receiver. The extracting algorithm at the receiver side : Get the input stego-key from the userand calculate average value of them. image that is sent from the : Extract each of LSB bit from the stego- image until to find out the end bit. : Reconstruct the collecting LSB bits from : Transform the LSB bits to correspondent In this proposed system, the secret message is used to hide in a cover bmp image. Firstly each character of secret message and each pixel of cover bmp image are converted into binary values. The user has to input sed to embed the secret message in a cover file. channge LSB bit values are used to substitute. Similarly each character of secret message is converted from decimal value to binary value. Finally verted binary value of secret message is substituted into each LSB bit of R-channel of cover image until the end of secret message. In this case the starting substitution point is chosen according to the key. The figure 3 illustrates the tution of secret message into each LSB bit of
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Figure2. Pixel representation and binary values Figure 3.LSB substitution algorithm of proposed system While defining the starting point of embedding LSB, the stego-key is firstly collected from the user. The summation of the ASCII value of each character of stego-key is calculated and then the average of those characters value is computed. While substituting the secret message into LSB of cover image, the first LSB position is chosen according to the calculated average value of input stego-key characters. Then the substitution processing will continue until the end of secret message. V. EXPERIMENTAL RESULTS AND ANALYSIS The following figure 4 shows the required processes at the sender side, in this case, the user has to input the stego-key which is already shared with the receiver side. In this research work, the cover image type of bmp is used to evaluate. Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 2. Pixel representation and binary values Figure 3.LSB substitution algorithm of proposed While defining the starting point of embedding LSB, from the user. The summation of the ASCII value of each character of key is calculated and then the average of those characters value is computed. While substituting the secret message into LSB of cover image, the first LSB ng to the calculated average key characters. Then the substitution processing will continue until the end of EXPERIMENTAL RESULTS AND The following figure 4 shows the required processes at the sender side, in this case, the user has to input key which is already shared with the receiver side. In this research work, the cover image Figure 4.Sender side of proposed system There are three portions at the sender side to accept as shown in figure 4.The first one is choosing the input cover image file, and then inputting the desired secret message and finally stego-key. The stego important to substitute and to extract secret message at both sides. The secret message should be arbitrary, the size of secret message can increase the processing time of substitution into the cover image. The following figure 5 shows the overall processes at the receiver side. The first important one is stego which is used to evaluate the average value of input characters. After calculating the average of input characters, the proposed system can point starting point to extract the secret message. The second important one is the sent stego must be in bmp file format only. Finally the proposed system can successfully extract the original secret message with correct stego-key. Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 397 ender side of proposed system There are three portions at the sender side to accept as shown in figure 4.The first one is choosing the input cover image file, and then inputting the desired secret key. The stego-key is very tant to substitute and to extract secret message at both sides. The secret message should be arbitrary, the size of secret message can increase the processing time of substitution into the cover image. The following figure 5 shows the overall processes at the receiver side. The first important one is stego-key which is used to evaluate the average value of input characters. After calculating the average of input characters, the proposed system can point out the starting point to extract the secret message. The second important one is the sent stego-image which must be in bmp file format only. Finally the proposed system can successfully extract the original secret key.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Figure5. Receiver side of proposed system When the proposed system evaluates, the original cover image is changed according to the input secret message and stego-key. The PSNR and SNR values of original and resulting images are calculated and compared in the following table 1. The resulting PSNR and SNR values of substituted cover image show a little bit changes with the original ones. In this case, different six bmp cover images are used to implement the proposed system. In order to measure the performance of t compression algorithms two performance parameters are used in this system.  Signal to Noise Ratio (SNR)  Peak Signal to Noise Ratio (PSNR) A. Signal to Noise Ratio The signal to noise ratio (SNR) is a technical term used to characterize the quality of the signal detection of a measuring system. In this case, a system uses a Table1. The comparison results of PSNR and SNR values between original and embedded images No. Types of Images Original Image PSNR 1 flower.bmp 22.2474 Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 Receiver side of proposed system evaluates, the original cover image is changed according to the input secret key. The PSNR and SNR values of original and resulting images are calculated and lowing table 1. The resulting PSNR and SNR values of substituted cover image show a little bit changes with the original ones. In this case, different six bmp cover images are used to In order to measure the performance of the image compression algorithms two performance parameters The signal to noise ratio (SNR) is a technical term used to characterize the quality of the signal detection of a measuring system. In this case, a system uses a noise “salt and pepper” with the original cover images. B. Peak Signal to Noise Ratio (PSNR) Mean Squared Error (MSE) is defined as the square of differences in the pixel values between the corresponding pixels of the two images. The mean square error (MSE) of N * M size image is given by the following equation (1), MSE= ΣM, N [I1 (m, n) –I2 (m, n)] M &N -number of rows and columns in the input images. PSNR (peak signal to noise ratio) to-noise ratio often abbreviated PSNR, is an engineering name, for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity. The peak error between the compressed image and original image is measured in terms of PSNR. The higher value of PSNR indicates higher quality of image. To calculate PSNR, MSE is first computed. PSNR value can be derived as in equation (2). Here ‘O’ and ‘D’ are the original and the distorted image pixel values (binary), respectively, to be compared, and the image size is M x N.        MSE MAX PSNR 2 10log10 Here, MAX is the peak value of the pixels in an image. MAX is 255 when pixels are presented in an 8 bitformat. Theoretically, the higher the PSNR value is, the better the image processing is; however, practically, there are some problems reported in the literature about the use of the PSNR for image quality assessment. 1. The comparison results of PSNR and SNR values between original and embedded images Original Image Embedded Image Image Size Resulting Images SNR PSNR SNR 17.5806 22.2568 17.59 255x256 Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 398 noise “salt and pepper” with the original cover Peak Signal to Noise Ratio (PSNR) an Squared Error (MSE) is defined as the square of differences in the pixel values between the corresponding pixels of the two images. The mean square error (MSE) of N * M size image is given by I2 (m, n)] 2 / (M*N) (1) number of rows and columns in the input PSNR (peak signal to noise ratio) -PSNR Peak signal- noise ratio often abbreviated PSNR, is an engineering name, for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity. tween the compressed image and original image is measured in terms of PSNR. The higher value of PSNR indicates higher quality of image. To calculate PSNR, MSE is first computed. PSNR value can be derived as in equation (2). Here nal and the distorted image pixel values (binary), respectively, to be compared, (2) is the peak value of the pixels in an image. is 255 when pixels are presented in an 8- bitformat. Theoretically, the higher the PSNR value the better the image processing is; however, there are some problems reported in the literature about the use of the PSNR for image quality 1. The comparison results of PSNR and SNR values between original and embedded images Resulting Images
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com 2 mandrill.bmp 21.8341 3 lenna.bmp 21.9866 4 peppers.bmp 21.9163 5 sails.bmp 21.9336 6 boy.bmp 21.9816 VI. DISCUSSION AND CONCLUSION In this research work, proposed LSB based steganography for embedding and extracting algorithms are presented. LSB based steganography embed the text message in LSB of the pixels of cover image according to the input stego-key. This paper also compares the results of PSNR values and SNR values of original and resulting cover images. The main goal of this paper is to show how secret image can be embedded and how it can be sent through the internet by fooling grabbers. Many problems can be encountered when important data is transferred over the public communication media. A safe and secure procedure is needed to transfer them easily. For this purpose simple image hiding techniques are used and the quality of stego images is also improved by using LSB substitution algorithms. So the hackers may not estimate secret message with resultingstego image. The experimental results show that the stego image and the cover image remain more or less identical which is the main focus of this paper. This means that a secret message can be sent to the destination without changes. PSNR and SNR values of original and embedded images are compared and analyzed. The comparison Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 16.6596 21.8459 16.67 512x512 16.8408 22.0123 16.87 220x220 12.4611 21.9112 12.46 512x512 16.9037 22.0068 16.98 768x512 17.1659 21.9232 17.11 768x512 DISCUSSION AND CONCLUSION In this research work, proposed LSB based steganography for embedding and extracting algorithms are presented. LSB based steganography embed the text message in LSB of the pixels of cover key. This paper also compares the results of PSNR values and SNR values of original and resulting cover images. The main goal of this paper is to show how secret image can be embedded and how it can be sent through the Many problems can be encountered when important over the public communication media. A safe and secure procedure is needed to transfer them easily. For this purpose simple image hiding techniques are used and the quality of stego images is also improved by using LSB substitution rs may not estimate secret message with resultingstego image. The experimental results show that the stego image and the cover image remain more or less identical which is the main focus of this paper. This means that a secret message can be stination without changes. Finally the PSNR and SNR values of original and embedded images are compared and analyzed. The comparison results show that the embedded resulting image is totally identical with the original ones. As the further work, other color cover image types such as jpg, tiff, png and so on will be used to compare with those results. Another better embedding and extracting algorithms will be used to implement it. Also not only secret text message but also secret image or data will be used to embed in a cover file. It is expected to find better technique and algorithms to hide more data in a cover image. Reference 1. M. Mishra, Department of Information and Communication Technology and Dr. M.C. Adhikary, Department of Applied Physics and Ballistics, “An Easy Yet Effective Method for Detecting Spatial Domain LSB Steganography”, International Journal of Computer Science and Business Informatics, vol.8, No.1 Dec 2013. 2. K. J. Devi, “A Secure Image Steganography using LSB Technique and Pseudo Ran Technique”, Department of Computer Science and Engineering National Institute of Technology Rourkela Odisha, Bachelor Thesis, May 2013. Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 399 results show that the embedded resulting image is totally identical with the original ones. color cover image types such as jpg, tiff, png and so on will be used to compare with those results. Another better embedding and extracting algorithms will be used to implement it. Also not only secret text message but also secret ed to embed in a cover file. It is expected to find better technique and algorithms to hide more data in a cover image. M. Mishra, Department of Information and Communication Technology and Dr. M.C. Adhikary, Department of Applied Physics and allistics, “An Easy Yet Effective Method for Detecting Spatial Domain LSB Steganography”, International Journal of Computer Science and Business Informatics, vol.8, No.1 Dec 2013. K. J. Devi, “A Secure Image Steganography using LSB Technique and Pseudo Random Encoding Technique”, Department of Computer Science and Engineering National Institute of Technology- Rourkela Odisha, Bachelor Thesis, May 2013.
  • 7. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com 3. R. Chandramouli, Msync lab, Stevens Institute of Technology, Dept. of Electrical and Computer Engineering, Hoboken and N. Memon, Polytechnic University, Computer Science Department, Brooklyn, “Analysis of LSB Based Image Steganography Techniques, IEEE 2001. 4. A. Khurana, Dept of Electronic, Punjab, India and B. M. Mehta, Dept of ECE, Punjab, India, “Comparison of LSB and MSB based Image Steganography, International Journal of Computer Science and Technology, Vol. 3 Issue 3, July 2012. 5. R. R. Krupa, Department of Information Technology, the Standard Fireworks, Rajaratnam College for Women, Sivakasi, Tamilnadu, “An Overview of Image Hiding Techniquess in Image Processing”, The SIJ Transaction of Computer Science Engineering and its Applications (CSEA), Vol.2, No.2, March 2014. 6. C. Chan, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong, “Hiding Data in Images Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 3 | Issue – 1 | Nov-Dec 2018 R. Chandramouli, Msync lab, Stevens Institute of Technology, Dept. of Electrical and Computer Hoboken and N. Memon, Polytechnic University, Computer Science Department, Brooklyn, “Analysis of LSB Based Image Steganography Techniques, IEEE 2001. A. Khurana, Dept of Electronic, Punjab, India and B. M. Mehta, Dept of ECE, Punjab, India, LSB and MSB based Image Steganography, International Journal of Computer Science and Technology, Vol. 3 Issue 3, July-Sept R. R. Krupa, Department of Information Technology, the Standard Fireworks, Rajaratnam College for Women, Sivakasi, Tamilnadu, India, “An Overview of Image Hiding Techniquess in Image Processing”, The SIJ Transaction of Computer Science Engineering and its Applications (CSEA), Vol.2, No.2, March-April C. Chan, Department of Computer Engineering ty University of Hong Kong, Hong Kong, “Hiding Data in Images by Simple LSB Substitution”, the Journal of the Pattern Recognition Society, August 2003. 7. B, S. Champakamala, K. Padmini, K. D. Radhika, Department of TCE, Don Bosco Institute of Technology, Bangalore, India, “Least Significant Bit Algorithm for Image Steganography”, International Journal of Advanced Computer Technology, Vol.3, No.4, August 2014. 8. C, R, Ravinder, A, R, Roja, Department of Master of Computer Appliccations, Teegala Krishna Reddy Engineering College, Medbowli, Meerpet, Hyderabad, “The Process of Encoding and Decoding of Image Steganography using LSB Algorithm”, International Journal of Computer Science and Engineering Technology”, Vol.2, Issue 11, Nov 2012. 9. 9. O. Osunade, and I. A. Ga Computer Science, University of Ibadan, Ibadan, “Enhancing the Least Significant Bit (LSB) Algorithm for Steganography”, International Journal of Computer Application, Vol. 149, No.3, Sept 2016. Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Dec 2018 Page: 400 by Simple LSB Substitution”, the Journal of the Pattern Recognition Society, August 2003. B, S. Champakamala, K. Padmini, K. D. Radhika, Department of TCE, Don Bosco Institute of galore, India, “Least Significant Bit Algorithm for Image Steganography”, International Journal of Advanced Computer Technology, Vol.3, No.4, August 2014. C, R, Ravinder, A, R, Roja, Department of Master of Computer Appliccations, Teegala Krishna ineering College, Medbowli, Meerpet, Hyderabad, “The Process of Encoding and Decoding of Image Steganography using LSB Algorithm”, International Journal of Computer Science and Engineering Technology”, Vol.2, O. Osunade, and I. A. Ganiyu, Department of Computer Science, University of Ibadan, Ibadan, “Enhancing the Least Significant Bit (LSB) Algorithm for Steganography”, International Journal of Computer Application, Vol. 149, No.3,