SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 441
Review Paper on LSB Based Stegnography
to Enhance Image Security
Naveen Verma1, Preeti Sondhi2, Gargi Kalia2
1M. Tech Scholar, 2Assistant Professor
1,2Universal Institution of Engineering & Technology, Lalru, Punjab, India
How to cite this paper: Naveen Verma |
Preeti Sondhi | Gargi Kalia "Review Paper
on LSB Based Stegnography to Enhance
Image Security"
Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August 2019, pp.441-444,
https://doi.org/10.31142/ijtsrd25326
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Steganography is the technique of hiding a secret message or information in a
cover message like an image, text or sound in such a way that only the desired
or intended recipient knows about the existence of the secret data. It can be
defined as the study of invisible communication which usually deals with the
technique of hiding the existence of the secret message. The hidden message
may be in the form of text, image, audio and video etc. An image afterinserting
the secret message into it by using a stego-key is known as a stego-image.
Nowadays steganography is important due to an exponential growthinsecret
communication by potential computer users over the internet. In this paper
we have analyzed the varioussteganographytechniquesand observed thatthe
security of the secret message can be enhanced by random selection of the
pixels for substitution in LSB steganography. Further the error metrics PSNR
(Peak Signal to Noise Ratio) should be high and MSE (Mean Square Error)
should be low indicating good quality re-construction.
KEYWORDS: steganography; data hiding; stego image; stego-image; LSB;
encryption
1. INTRODUCTION
In recent trends in the world, the communication is an indispensable need of
every growing area. Everyone wants the confidentiality and safety of their
communicating data.
The network security is becoming indispensable as the
volume of data being exchanged over the Internet is
escalating day by day. The two important techniques for
providing security to information or data being shared are
cryptography and steganography. Both are well known and
widely used methods in information security.
In a large number of applications, it is desirable that the
secracy of the communicated data or information is
maintained. Such secret communication ranges from the
apparent cases of bank transfers,corporatecommunications,
and credit card purchases, on down to a large percentage of
everyday email. Steganography is an ancient art of
embedding a secret message (data embedding) [4] into a
seemingly benign message. Most of the newer applications
use steganography, for instance, a watermark to protect a
copy right on information. The forms of steganography vary,
but unsurprisingly, benign spam messages are turning up
more often containing embedded text. Steganography [1,11]
word originated from Greek words Steganos (Covered) and
Graptos (Writing) which literally means cover writing.
Generally, steganography is knownassecretcommunication.
Steganography means to hide message’sexistenceinanother
medium (audio, video, image, communication). Today’s
steganography systems use multimedia objects like image,
audio, video etcascovermediabecausepeopleoftentransmit
digital images over email or share them through other
internet communication mediums. It is different from
protecting the actual content of a message in a way which
hides a message into another message.
Fig.1. A Generalized steganographic framework
2. Types and applications of Steganography
Image Steganography is the technique of steganography in
which an image is taken as cover object. This steganography
is known as image steganography. Generally, in this
technique the LSB (Least Significant Bit) [8,9] of the image
pixel value is manipulated to hide the message.
Video Steganography is a technique to hide a secret message
or secret information intodigitalvideoformat.Videowhichis
a combination of picture frames is used as a carrierfor secret
information. Generally Discrete Cosine Transform (DCT)
which alters the values, for instance,8.667to9isusedtohide
the secret information in each of the images in the video,
which cannot be detected by the human eye. Video
steganography uses formats such as H.264, MP4 (Motion
Picture 4), MPEG (MovingPictureExpertsGroup),AVI(Audio
Video Interleave) or other video formats.
IJTSRD25326
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 442
Audio Steganography is a type of steganographyinwhichthe
audiomessageis taken as a carrierfortransmittingthesecret
information over a communication channel. It has emergeda
remarkable medium due to the popularity of VOIP (Voice
Over Internet Protocol). Audio steganography uses digital
audio formats such as WAVE (Waveform Audio file), MIDI
(Musical Instrument Digital Interface), AVI and MPEG etc for
steganography.
Text Steganography is the technique of steganography in
which the information is hidden in a text message, for
instance, if the information text is hidden in HTML (Hyper
Text Markup Language) coding of a web pages, it makes the
detection of secret information almost impractical because
theweb pages are thebasicbuildingblocksofthewebsiteson
the internet.
There are various applications of Steganography like
confidential communication and secret data storing,
protection of data alteration, access controlsystemfordigital
content distribution and media Database systems.
3. Techniques used in Steganography
Depending on the type of the cover object there are many
suitable steganographic techniques which are followed in
order to obtain security.
The terminologies used in Steganography are mentioned in
the following paragraph.
Cover Message is the carrier of the message such as image,
video, audio, text or someother digital media.Covermessage
is also called the Cover image or Cover work.
Secret Message is the information which is needed to be
hidden in the cover message.
SecretKeyis used to embed thesecretmessagedependingon
the hiding algorithm. Secret key is also called as Stego key or
encryption/decryption key.
Stego Message is the message after embedding the secret
message into the cover message. Stegomessage is also called
the stego-image, stego-work, stego-object or steganogram.
Classical LSB Algorithm
Image is composed of pixelswhich is a light intensityandthis
light intensity is a number. So an image is an array utilizing
256 colors (common images) having different pixel values at
different locations. Digital images are typically stored in
either 24-bit or 8-bit per pixel. A 24-bit image is sometimes
known as true color image.Thisisobviousthata24-bitimage
provides more space for hiding information; however,24-bit
images are generally large and not that common. A 24-bit
image 1024 pixels wide by 768 pixels high would have a size
of about2 megabytes. Such large files would attractattention
when they would be transmitted across a network or the
Internet.Generally, 8 bit images areused tohideinformation
such as GIF files represented as a single byte for each pixel.
Now, each pixel can correspond to 256 colors. It can be said
that pixel value ranges from 0 to 255 and the selected pixels
indicates certain colors on the screen. The technique for
classical leastsignificantbit implies the replacementofLSB’s
of cover images with secret message data in order to hide
information by altering cover image. Since LSB is replaced
there is no significant effect on cover image and hence
intended user will not get the idea that some message is
hidden under the image. Here given a example to show LSB
replacement to hide letter ‘A’ behind the cover image.
Cover Image bits
00100111 11101001 11001000 00100111 11001000
11101001 11001000 00100111
Message Image: 10000001
Steganographed Image
00100111 11101000 11001000 00100110 11001000
11101000 11001000 00100111
The bold bits represent the changed bits. LSB substitution
requires on an average that only half the bits in an image be
changed.
The disadvantages included in theLSB approach isthesizeof
cover image required for a particular message image that is
for a certain capacity of message cover image required is 8
times thus increasing the bandwidth to send the image.
Another bigdisadvantage is that if an eavesdropper suspects
that some secret data is hidden behind the cover image, he
can easily extract that secret message by just collecting LSBs
of stego image.
Inverted Bit LSB Substitution
Nadeem Akhtar et. al. proposed a scheme in which PSNR
[4,13] of the stego image has increased and also security is
maintained by selecting pixels randomly. In this technique
the message bits are embedded in the cover image pixels
randomlyand a count with respect to the combination ofbits
at 2nd and 3rd bits of the pixel is maintained. Suppose 2nd
and 3rd bits of a pixel are 01.If the LSB of image matches this
counter is incremented for not changed pixel else counter is
incremented for changed bits, same is performed for all the
combinations (00, 01, 10, and 11). Example: Four message
bits 1 0 0 0 are to be hidden into four cover image pixels
10000100
00101101
11101101
11101111
After plain LSB steganography [8], stegoimage pixels are
10000101
00101100
11101100
11101110
No. of changed pixels is four. According to algorithm check
the 2nd and 3rd Least significant bit of the stego- image.For
example let 2nd pixel=0 and 3rd pixel=1.Now if the 2nd and
3rd bit of pixel matches the requiredcombinationthaninvert
the LSB else it will remain the same.Thus if we applied this
case to above example than the pixels in the stego image will
be
10000100
00101101
11101101
11101110
No. of changed pixel is one, so by employing this technique
there will be increase in the PSNR. Same process will be
performed for all the bit combinations. The bit inversion is
performed only if the changed bits count is greater than
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 443
unchanged bits count thus leading to less distortion of the
cover image and leading to increased PSNR.
4. Related work
Akhtar et al [1] Nadeem Akhtar et al haveimplemented
steganography for images, with an improvement in both
security and image quality. The quality of the stego-image is
improved by using bit-inversiontechnique.In thistechnique,
certain least significant bits of cover imageareinverted after
plain LSB steganography which co-occurswithsomepattern
of other bits and thus reduce the number of modified LSBs.
Therefore, a lesser number of LSBs of the cover image are
altered in comparison to plain LSB method, thereby,
improving the PSNR of stegoimage. By storing the bit
patterns for which LSBs are inverted, message image can be
obtained correctly.This technique uses RC4 algorithm to
improve the robustness of steganography. The purpose of
RC4 algorithm is to achieve the randomization in hiding
message image bits into cover imagepixelsinsteadofstoring
them sequentially.
Sharma and Upadhaya et al [2] The authors have given
overview of different steganographic techniques, its major
types and classification of steganography which have been
proposed in the literature during last few years. They have
critically analysed different proposed techniques which
show that visual quality of the image degrades when the
hidden data increases up to a threshold limit using Least
Significant Bit (LSB) based methods.
Latika and Gulati et al [3] The authors have given an
understandingofcryptographyand steganographyconcepts.
In addition to this they have given an review of the research
and developments in the field of steganography along with
the various steganography techniques. Their work also
provides the suggestion regarding the future researches in
the field of steganography.
Champakamala et al [4] The authors has given a technique
for using the hardware or electronics in image
steganography. They have demonstrated that embedding
secret information inside images requires thorough and in-
depth computations and therefore,designingSteganography
in hardware speeds up Steganography.
Bhardwaj and Sharma et al [5] In thispapertheauthors have
provided three layers of security. Rrather than hiding the
message bits directly in cover image, pixels are generated
randomly through a pseudo random number generator and
after that secret data is hidden behind a cover image using
inverted LSB method. Their experimental study points out
that the proposed system is better than basic LSB method in
terms of higher visual quality which is indicated by the high
PSNR values.
Arya [6] In this paper author has proposed improved LSB
substitution method for hiding secret image informationfile
into a color image. Many different carrier file formats can be
used for instance, bitmap, jpeg and PNG to prove that this
technique is suitable for these formats. The authors have
intended the performance evaluation of secrete image
steganography techniques using LSB method for data and
image security, its comparison on different size and image
format (.bmp; .jpg; .png) and calculation of performance
parameters like PSNR and MSE for analysing the payload
capacity.
Mustafa et al [7] In this paper the authors have provided a
series of enhancements and argued that the proposed
method fixed the weakness of Simple LSB image
steganography method. The proposed method combines six
fundamental improvements, specifically: CRC-32 checksum,
Gzip compression, AES encryption, header information,
pseudo-random pixel selection technique based on the
Fisher-Yates Shuffle algorithm and 8 bpp embedding
algorithm.
Ansari [8] The author has presented the comparative study
and performance analysis of different image steganography
techniques using various types of cover media ((like
BMP/JPEG/PNG etc.) with the discussion of their file
formats.
5. Proposed Work
The aim of the dissertation is to study various
steganographic techniques using LSB substitution. The
problem with older techniques isthatif thepixelsare chosen
sequentially then the attacker may extract the secret
message on suspicion. This problem can be eliminated by
selecting the pixels randomly. In addition to this if second
and third significant bits are substituted,thePSNRdecreases
and Mean Square Error increases indicating poor quality
reconstruction i.e. a distorted or blurred image.
Here we present a LSB based steganography method which
is more secure and robust than the plainLSBmethod. Rather
than storing the message bits sequentially, they can be
stored in a random order by using a suitable algorithm for
random selection of the pixels in the cover messageand thus
can enhance the security of the secret message because an
attacker would not know about the encoding pattern of the
secret message. Moreover, key and value pairs can be used
for extraction of the secret message.
6. Conclusion
In this paper we have reviewed over different techniques of
steganography. Randomized selection of image pixels
increases the security of data to be transmitted over a
communication channel. The PSNR is maximum and MSE is
minimum when the Least Significant Bit is substituted.
The future work can be done in increasing the stego-image
security for extracting the secret message, enhancing the
PSNR and decreasing the MSE further. Moreover, the issues
like the payload capacity i.e. the amount of secret
information which can be carried in a cover message,
robustness and temper resistance of the secret message can
be addressed as future scope of this dissertation.
7. References
[1] S. A. Arshiya, “A Comparative Study of Recent
Steganography Techniques for Multiple Image
Formats“, I. J. Computer Network and Information
Security, 2019.
[2] R. Pooja, “Analysis of Image Steganographic
Techniques“, International Journal of Computer
Applications, ISSN 0975-8887, Volume 114 Issue 1 pp.
11-17, 2015.
[3] A.Anupriya, “Performance Evaluation of SecreteImage
Steganography Techniques Using Least Significant Bit
(LSB) Method“, International Journal of Computer
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 444
Science Trends and Technology (IJCST) Volume 6 Issue
2, Mar - Apr 2018.
[4] C. K. Mustafa and E. Wisam, “New LSB-based colour
image steganography methodtoenhancetheefficiency
in payload capacity, security and integrity check“,
Sadhana (Indian Academy of Sciences), 2018.
[5] H. A. May, “An Efficient Image Cryptography using
Hash-LSB Steganography with RC4 and Pixel Shuffling
Encryption Algorithms“, Annual Conference on New
Trends in Information and Communication Technology
Applications (NTICT), 2017.
[6] K. T. Anand et al, “Image SteganographyonColorImage
using SVD and RSA with 2-1-4-LSB Technique“,
International Conference on Computation of
Power,Energy, Information and Communication
(ICCPEIC), 2017.
[7] S. V. Sylish, “Image Steganography in High Entropy
Regions Using A Key and Modified LSB for Improved
Security“, Proceedings of the IEEE 2017 International
Conference on Computing Methodologies and
Communication (ICCMC), 2017.
[8] B. Rupali and S. Vaishali, “Image Steganography Based
on Complemented Message and Inverted bit LSB
Substitution“ Procedia computer Science (ELSEVIER),
2016.
[9] K. Ashadeep and K.Rakesh et al, “Review Paper on
Image Steganography“ International Journal of
Advanced Research in Computer Science and Software
Engineering, 2016.
[10] Latika and G. Yogita, “A Review of Steganography
Research and Development“ International Journal of
Advanced Research in Computer Science and Software
Engineering, 2015.
[11] S. Abha et al, “A Survey of Image Steganography
Techniques“, International Journal of ComputerScience
and Technology (IJCST), Volume 5, Issue 3, July - Sept
2014.
[12] Champakamala and K. Padmini et al.,“ Least Significant
Bit algorithm for image steganography“, International
Journal of Advanced Computer Technology (IJACT).
[13] A. Nadeem, “Enhancing the Security and Quality of LSB
based Image Steganography“, 5th International
Conference on Computational Intelligence and
Communication Networks, 2013.
[14] K. Zaidoon and A. Al , “Overview: Main Fundamentals
for Steganography“, Journal of Computing, Volume 2,
pp. 158-165, March 2010.

More Related Content

What's hot

Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
International Journal of Science and Research (IJSR)
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Steganography
SteganographySteganography
Steganography
Abhishek Singh
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IOSR Journals
 
Ijetr042105
Ijetr042105Ijetr042105
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
IJERA Editor
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
Steganography
SteganographySteganography
Steganography
Zuala Khawlhring
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
Abhishek Dhara
 
B03208016
B03208016B03208016
B03208016inventy
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

What's hot (20)

Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
B03208016
B03208016B03208016
B03208016
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Report
ReportReport
Report
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Similar to Review Paper on LSB Based Stegnography to Enhance Image Security

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
ijtsrd
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
IJERA Editor
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
ssuser50a5ec
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
review.pptx
review.pptxreview.pptx
review.pptx
TechNest1
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
 
Analysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyAnalysis Of Different Types Of Steganography
Analysis Of Different Types Of Steganography
Scott Donald
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
IOSRJECE
 
G017444651
G017444651G017444651
G017444651
IOSR Journals
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
ijseajournal
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
IJNSA Journal
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 

Similar to Review Paper on LSB Based Stegnography to Enhance Image Security (20)

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
K0815660
K0815660K0815660
K0815660
 
Stegnography
StegnographyStegnography
Stegnography
 
review.pptx
review.pptxreview.pptx
review.pptx
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Analysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyAnalysis Of Different Types Of Steganography
Analysis Of Different Types Of Steganography
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
G017444651
G017444651G017444651
G017444651
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Review Paper on LSB Based Stegnography to Enhance Image Security

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 441 Review Paper on LSB Based Stegnography to Enhance Image Security Naveen Verma1, Preeti Sondhi2, Gargi Kalia2 1M. Tech Scholar, 2Assistant Professor 1,2Universal Institution of Engineering & Technology, Lalru, Punjab, India How to cite this paper: Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.441-444, https://doi.org/10.31142/ijtsrd25326 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image afterinserting the secret message into it by using a stego-key is known as a stego-image. Nowadays steganography is important due to an exponential growthinsecret communication by potential computer users over the internet. In this paper we have analyzed the varioussteganographytechniquesand observed thatthe security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR (Peak Signal to Noise Ratio) should be high and MSE (Mean Square Error) should be low indicating good quality re-construction. KEYWORDS: steganography; data hiding; stego image; stego-image; LSB; encryption 1. INTRODUCTION In recent trends in the world, the communication is an indispensable need of every growing area. Everyone wants the confidentiality and safety of their communicating data. The network security is becoming indispensable as the volume of data being exchanged over the Internet is escalating day by day. The two important techniques for providing security to information or data being shared are cryptography and steganography. Both are well known and widely used methods in information security. In a large number of applications, it is desirable that the secracy of the communicated data or information is maintained. Such secret communication ranges from the apparent cases of bank transfers,corporatecommunications, and credit card purchases, on down to a large percentage of everyday email. Steganography is an ancient art of embedding a secret message (data embedding) [4] into a seemingly benign message. Most of the newer applications use steganography, for instance, a watermark to protect a copy right on information. The forms of steganography vary, but unsurprisingly, benign spam messages are turning up more often containing embedded text. Steganography [1,11] word originated from Greek words Steganos (Covered) and Graptos (Writing) which literally means cover writing. Generally, steganography is knownassecretcommunication. Steganography means to hide message’sexistenceinanother medium (audio, video, image, communication). Today’s steganography systems use multimedia objects like image, audio, video etcascovermediabecausepeopleoftentransmit digital images over email or share them through other internet communication mediums. It is different from protecting the actual content of a message in a way which hides a message into another message. Fig.1. A Generalized steganographic framework 2. Types and applications of Steganography Image Steganography is the technique of steganography in which an image is taken as cover object. This steganography is known as image steganography. Generally, in this technique the LSB (Least Significant Bit) [8,9] of the image pixel value is manipulated to hide the message. Video Steganography is a technique to hide a secret message or secret information intodigitalvideoformat.Videowhichis a combination of picture frames is used as a carrierfor secret information. Generally Discrete Cosine Transform (DCT) which alters the values, for instance,8.667to9isusedtohide the secret information in each of the images in the video, which cannot be detected by the human eye. Video steganography uses formats such as H.264, MP4 (Motion Picture 4), MPEG (MovingPictureExpertsGroup),AVI(Audio Video Interleave) or other video formats. IJTSRD25326
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 442 Audio Steganography is a type of steganographyinwhichthe audiomessageis taken as a carrierfortransmittingthesecret information over a communication channel. It has emergeda remarkable medium due to the popularity of VOIP (Voice Over Internet Protocol). Audio steganography uses digital audio formats such as WAVE (Waveform Audio file), MIDI (Musical Instrument Digital Interface), AVI and MPEG etc for steganography. Text Steganography is the technique of steganography in which the information is hidden in a text message, for instance, if the information text is hidden in HTML (Hyper Text Markup Language) coding of a web pages, it makes the detection of secret information almost impractical because theweb pages are thebasicbuildingblocksofthewebsiteson the internet. There are various applications of Steganography like confidential communication and secret data storing, protection of data alteration, access controlsystemfordigital content distribution and media Database systems. 3. Techniques used in Steganography Depending on the type of the cover object there are many suitable steganographic techniques which are followed in order to obtain security. The terminologies used in Steganography are mentioned in the following paragraph. Cover Message is the carrier of the message such as image, video, audio, text or someother digital media.Covermessage is also called the Cover image or Cover work. Secret Message is the information which is needed to be hidden in the cover message. SecretKeyis used to embed thesecretmessagedependingon the hiding algorithm. Secret key is also called as Stego key or encryption/decryption key. Stego Message is the message after embedding the secret message into the cover message. Stegomessage is also called the stego-image, stego-work, stego-object or steganogram. Classical LSB Algorithm Image is composed of pixelswhich is a light intensityandthis light intensity is a number. So an image is an array utilizing 256 colors (common images) having different pixel values at different locations. Digital images are typically stored in either 24-bit or 8-bit per pixel. A 24-bit image is sometimes known as true color image.Thisisobviousthata24-bitimage provides more space for hiding information; however,24-bit images are generally large and not that common. A 24-bit image 1024 pixels wide by 768 pixels high would have a size of about2 megabytes. Such large files would attractattention when they would be transmitted across a network or the Internet.Generally, 8 bit images areused tohideinformation such as GIF files represented as a single byte for each pixel. Now, each pixel can correspond to 256 colors. It can be said that pixel value ranges from 0 to 255 and the selected pixels indicates certain colors on the screen. The technique for classical leastsignificantbit implies the replacementofLSB’s of cover images with secret message data in order to hide information by altering cover image. Since LSB is replaced there is no significant effect on cover image and hence intended user will not get the idea that some message is hidden under the image. Here given a example to show LSB replacement to hide letter ‘A’ behind the cover image. Cover Image bits 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 Message Image: 10000001 Steganographed Image 00100111 11101000 11001000 00100110 11001000 11101000 11001000 00100111 The bold bits represent the changed bits. LSB substitution requires on an average that only half the bits in an image be changed. The disadvantages included in theLSB approach isthesizeof cover image required for a particular message image that is for a certain capacity of message cover image required is 8 times thus increasing the bandwidth to send the image. Another bigdisadvantage is that if an eavesdropper suspects that some secret data is hidden behind the cover image, he can easily extract that secret message by just collecting LSBs of stego image. Inverted Bit LSB Substitution Nadeem Akhtar et. al. proposed a scheme in which PSNR [4,13] of the stego image has increased and also security is maintained by selecting pixels randomly. In this technique the message bits are embedded in the cover image pixels randomlyand a count with respect to the combination ofbits at 2nd and 3rd bits of the pixel is maintained. Suppose 2nd and 3rd bits of a pixel are 01.If the LSB of image matches this counter is incremented for not changed pixel else counter is incremented for changed bits, same is performed for all the combinations (00, 01, 10, and 11). Example: Four message bits 1 0 0 0 are to be hidden into four cover image pixels 10000100 00101101 11101101 11101111 After plain LSB steganography [8], stegoimage pixels are 10000101 00101100 11101100 11101110 No. of changed pixels is four. According to algorithm check the 2nd and 3rd Least significant bit of the stego- image.For example let 2nd pixel=0 and 3rd pixel=1.Now if the 2nd and 3rd bit of pixel matches the requiredcombinationthaninvert the LSB else it will remain the same.Thus if we applied this case to above example than the pixels in the stego image will be 10000100 00101101 11101101 11101110 No. of changed pixel is one, so by employing this technique there will be increase in the PSNR. Same process will be performed for all the bit combinations. The bit inversion is performed only if the changed bits count is greater than
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 443 unchanged bits count thus leading to less distortion of the cover image and leading to increased PSNR. 4. Related work Akhtar et al [1] Nadeem Akhtar et al haveimplemented steganography for images, with an improvement in both security and image quality. The quality of the stego-image is improved by using bit-inversiontechnique.In thistechnique, certain least significant bits of cover imageareinverted after plain LSB steganography which co-occurswithsomepattern of other bits and thus reduce the number of modified LSBs. Therefore, a lesser number of LSBs of the cover image are altered in comparison to plain LSB method, thereby, improving the PSNR of stegoimage. By storing the bit patterns for which LSBs are inverted, message image can be obtained correctly.This technique uses RC4 algorithm to improve the robustness of steganography. The purpose of RC4 algorithm is to achieve the randomization in hiding message image bits into cover imagepixelsinsteadofstoring them sequentially. Sharma and Upadhaya et al [2] The authors have given overview of different steganographic techniques, its major types and classification of steganography which have been proposed in the literature during last few years. They have critically analysed different proposed techniques which show that visual quality of the image degrades when the hidden data increases up to a threshold limit using Least Significant Bit (LSB) based methods. Latika and Gulati et al [3] The authors have given an understandingofcryptographyand steganographyconcepts. In addition to this they have given an review of the research and developments in the field of steganography along with the various steganography techniques. Their work also provides the suggestion regarding the future researches in the field of steganography. Champakamala et al [4] The authors has given a technique for using the hardware or electronics in image steganography. They have demonstrated that embedding secret information inside images requires thorough and in- depth computations and therefore,designingSteganography in hardware speeds up Steganography. Bhardwaj and Sharma et al [5] In thispapertheauthors have provided three layers of security. Rrather than hiding the message bits directly in cover image, pixels are generated randomly through a pseudo random number generator and after that secret data is hidden behind a cover image using inverted LSB method. Their experimental study points out that the proposed system is better than basic LSB method in terms of higher visual quality which is indicated by the high PSNR values. Arya [6] In this paper author has proposed improved LSB substitution method for hiding secret image informationfile into a color image. Many different carrier file formats can be used for instance, bitmap, jpeg and PNG to prove that this technique is suitable for these formats. The authors have intended the performance evaluation of secrete image steganography techniques using LSB method for data and image security, its comparison on different size and image format (.bmp; .jpg; .png) and calculation of performance parameters like PSNR and MSE for analysing the payload capacity. Mustafa et al [7] In this paper the authors have provided a series of enhancements and argued that the proposed method fixed the weakness of Simple LSB image steganography method. The proposed method combines six fundamental improvements, specifically: CRC-32 checksum, Gzip compression, AES encryption, header information, pseudo-random pixel selection technique based on the Fisher-Yates Shuffle algorithm and 8 bpp embedding algorithm. Ansari [8] The author has presented the comparative study and performance analysis of different image steganography techniques using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file formats. 5. Proposed Work The aim of the dissertation is to study various steganographic techniques using LSB substitution. The problem with older techniques isthatif thepixelsare chosen sequentially then the attacker may extract the secret message on suspicion. This problem can be eliminated by selecting the pixels randomly. In addition to this if second and third significant bits are substituted,thePSNRdecreases and Mean Square Error increases indicating poor quality reconstruction i.e. a distorted or blurred image. Here we present a LSB based steganography method which is more secure and robust than the plainLSBmethod. Rather than storing the message bits sequentially, they can be stored in a random order by using a suitable algorithm for random selection of the pixels in the cover messageand thus can enhance the security of the secret message because an attacker would not know about the encoding pattern of the secret message. Moreover, key and value pairs can be used for extraction of the secret message. 6. Conclusion In this paper we have reviewed over different techniques of steganography. Randomized selection of image pixels increases the security of data to be transmitted over a communication channel. The PSNR is maximum and MSE is minimum when the Least Significant Bit is substituted. The future work can be done in increasing the stego-image security for extracting the secret message, enhancing the PSNR and decreasing the MSE further. Moreover, the issues like the payload capacity i.e. the amount of secret information which can be carried in a cover message, robustness and temper resistance of the secret message can be addressed as future scope of this dissertation. 7. References [1] S. A. Arshiya, “A Comparative Study of Recent Steganography Techniques for Multiple Image Formats“, I. J. Computer Network and Information Security, 2019. [2] R. Pooja, “Analysis of Image Steganographic Techniques“, International Journal of Computer Applications, ISSN 0975-8887, Volume 114 Issue 1 pp. 11-17, 2015. [3] A.Anupriya, “Performance Evaluation of SecreteImage Steganography Techniques Using Least Significant Bit (LSB) Method“, International Journal of Computer
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25326 | Volume – 3 | Issue – 5 | July - August 2019 Page 444 Science Trends and Technology (IJCST) Volume 6 Issue 2, Mar - Apr 2018. [4] C. K. Mustafa and E. Wisam, “New LSB-based colour image steganography methodtoenhancetheefficiency in payload capacity, security and integrity check“, Sadhana (Indian Academy of Sciences), 2018. [5] H. A. May, “An Efficient Image Cryptography using Hash-LSB Steganography with RC4 and Pixel Shuffling Encryption Algorithms“, Annual Conference on New Trends in Information and Communication Technology Applications (NTICT), 2017. [6] K. T. Anand et al, “Image SteganographyonColorImage using SVD and RSA with 2-1-4-LSB Technique“, International Conference on Computation of Power,Energy, Information and Communication (ICCPEIC), 2017. [7] S. V. Sylish, “Image Steganography in High Entropy Regions Using A Key and Modified LSB for Improved Security“, Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication (ICCMC), 2017. [8] B. Rupali and S. Vaishali, “Image Steganography Based on Complemented Message and Inverted bit LSB Substitution“ Procedia computer Science (ELSEVIER), 2016. [9] K. Ashadeep and K.Rakesh et al, “Review Paper on Image Steganography“ International Journal of Advanced Research in Computer Science and Software Engineering, 2016. [10] Latika and G. Yogita, “A Review of Steganography Research and Development“ International Journal of Advanced Research in Computer Science and Software Engineering, 2015. [11] S. Abha et al, “A Survey of Image Steganography Techniques“, International Journal of ComputerScience and Technology (IJCST), Volume 5, Issue 3, July - Sept 2014. [12] Champakamala and K. Padmini et al.,“ Least Significant Bit algorithm for image steganography“, International Journal of Advanced Computer Technology (IJACT). [13] A. Nadeem, “Enhancing the Security and Quality of LSB based Image Steganography“, 5th International Conference on Computational Intelligence and Communication Networks, 2013. [14] K. Zaidoon and A. Al , “Overview: Main Fundamentals for Steganography“, Journal of Computing, Volume 2, pp. 158-165, March 2010.