SlideShare a Scribd company logo
STEGANOGRAPHY
Presented by :
Jitendra Singh Deshwal
Under Supervision of:
Mr. Satish Kumar
Mr. Ravi Saharan
Overview
• Introduction
• History
• Problem statement
• Objective of the study
• Scope
• Steganography techniques
• LSB algorithm
• Design phase
• Snapshots
• Results and discussion
• Conclusion and further enhancement
• References
Introduction
Continue
 “The goal of steganography is to hide messages in such a
way that no one apart from the intended recipient even
knows that a message has been sent.”
 This can be achieve by concealing the existence of
information within seemingly harmless carriers or cover
 It can be understand by the following figure.
History
• The first recorded uses of steganography can be traced
back to 440 BC when Herodotus mentions an example of
steganography in the histories of Herodotus.
• ancient example is that of histories, who shaved the head
of his most trusted slave and tattooed a message on it.
After his hair had grown the message was hidden. The
purpose was to instigate a revolt against the Persians.
Continue
• During the "Cold War" period, US and USSR wanted to hide their sensors in
the enemy's facilities. These devices had to send data to their nations,
without being spotted.
• In October 2001, the New York Times published an article claiming that al-
Qaeda had used steganography to encode messages into images, and then
transported these via e-mail and possibly via USENET to prepare and
execute the September 11, 2001 terrorist attack.
Problem Statement
 How can we send a message secretly to the destination.
 Using steganography, information can be hidden in carriers such as images,
audio files, text files, videos and data transmissions.
 In this study, I proposed a new framework of an image steganography system
to hide a digital text of a secret message.
Objective of the Study
In my project I primarily concentrated on the data security issues when
sending the data over the network using steganographic techniques.
• The main objectives of the project are
• Requirement of this steganography system is that the hider message
carried by stego-media should not be sensible to human beings.
• The other goal of steganography is to avoid drawing suspicion to the
existence of a hidden message.
• This approach of information hiding technique has recently become
important in a number of application areas.
Scope
• The scope of the project is to limit unauthorized access and provide better
security during message transmission. To meet the requirements, I use the
simple and basic approach of steganography.
• In this project, the proposed approach finds the suitable algorithm for
embedding the data in an image using steganography which provides the
better security pattern for sending messages through a network.
• For practically implementing the function of the discussed algorithms,
Microsoft .NET framework is used.
Steganography Technique
Pure steganography: Pure steganography is the process of embedding the
data into the object without using any private keys. This type of
steganography entirely depends upon the secrecy. This type of
steganography uses a cover image in which data is to be embedded,
personal information to be transmitted, and encryption decryption algorithms
to embed the message into image.
LSB Algorithm
• LSB (Least Significant Bit) substitution is the process of adjusting the least
significant bit pixels of the carrier image.
• It is a simple approach for embedding message into the image.
• The Least Significant Bit insertion varies according to number of bits in an
image.
• For an 8 bit image, the least significant bit i.e., the 8th bit of each byte of the
image is changed to the bit of secret message.
• For 24 bit image, the colors of each component like RGB (red, green and
blue) are changed.
• LSB is effective in using BMP images since the compression in BMP is
lossless
How LSB Works
Structure of text file:
Any text file consists of streams of characters , each character is 1 byte
(ASCII code) each byte as all of us of course know consists of 8 bits .
Continue
Continue
Continue
• If we want to hide the data like “Aha!”
Then we convert the message “Aha!” into ASCII Code and
then there equivalent binary code.
A=65 (01000001)
h=104(01101000)
a=97(01100001)
!=33(00100001)
• See the above diagram for seeing the changes in bits
Continue
Design Phase
Start
Application
Encryption Decryption
Image file
BMP image
file
Image Message
file
Image Messagefile
Figure: Block diagram for Steganography
Continue
• ENCRYPTION PHASE:
The “Encryption phase” uses two types of files for encryption purpose. One is
the secret file which is to be transmitted securely, and the other is a carrier file such as image. In the
encryption phase the data is embedded into the image.
Figure: Encryption Phase Process
Continue
• DECRYPTION PHASE:
The Decryption phase is reverse to encryption phase. In decryption phase, the
carrier image in which the data is hided is given as an input file. decryption section uses the “Least
Significant bit Algorithm” (LSB) by which the encoded bits in the image is decoded and turns to its
original state and gives the output as a text document.
Figure: Decryption Phase Process
Snapshots
Continue
Continue
Continue
Continue
Continue
Results and Discussion
• In this project I mainly concentrated on embedding the data into an image. I
have designed the steganographic application which embedded the data into
the image.
• Normally, after embedding the data into the image, the image may lose its
resolution. In the proposed approach, the image remains unchanged in its
resolution as well in size.
• The speed of embedding the data into the image is also high in the proposed
approach such that the image is protected and the data to the destination is
sent securely.
• For the decryption phase, I have used the same .NET programming
language for the purpose of designing.
• There are many steganographic algorithms available like JSteg, F5 and LSB
algorithms. I have used the Least Significant Bit algorithm in designing the
steganographic application because LSB algorithm works efficiently when we
consider bit map images .bmp files. The speed of embedding is also high
when using LSB compared to the JSteg algorithm.
Conclusion and Further Enhancement
• In the present world, the data transfers using internet is rapidly growing
because it is so easier as well as faster to transfer the data to destination. So,
many individuals and business people use to transfer business documents,
important information using internet.
• Security is an important issue while transferring the data using internet
because any unauthorized individual can hack the data and make it useless
or obtain information un- intended to him.
• The future work on this project is to improve the compression ratio of the
image to the text. This project can be extended to a level such that it can be
used for the different types of image formats like .bmp, .jpeg, .tif etc., in the
future. The security using Least Significant Bit Algorithm is good but we can
improve the level to a certain extent by varying the carriers as well as using
different keys for encryption and decryption.
References
• Amirthanjan,R. Akila,R & Deepika chowdavarapu, P., 2010. A Comparative Analysis of Image
Steganography, International Journal of Computer Application.
• Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image.
International Journal of Advancements in Technology.
• Cox, I. Miller, M. Bloom, J. Fridrich, J & Kalker, T. 2008. Digital watermarking and
Steganography.2ndEd. Elsevier.
• Obaida Mohammad Awad Al-Hazaimeh Hiding Data in Images Using New Random Technique
Department of Information Technology, AL-BALQA Applied University/Al-Huson University College,
Irbid, Al-Huson, 50, Jordan.
• An Overview of Steganography by Shawn D. Dickman Computer Forensics Term Paper, James
Madison University.
• A Tutorial Review on Steganography by Samir K Bandyopadhyay, Debnath Bhattacharyya,
Debashis Ganguly, Swarnendu Mukherjeet and Poulami Das University of Calcutta.
• Exploring Steganography: Seeing the Unseen by Neil F. Johnson Sushil Jajodia George Mason
University.
Thank You

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
Lovely Mnadal
 

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 

Similar to Steganography

Steganography
SteganographySteganography
Steganography
Sonam M
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
SruthiReddy112
 

Similar to Steganography (20)

Stegnography
StegnographyStegnography
Stegnography
 
1.pdf
1.pdf1.pdf
1.pdf
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
Image Security
Image SecurityImage Security
Image Security
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Steganography
SteganographySteganography
Steganography
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
G0210032039
G0210032039G0210032039
G0210032039
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Miniproject steganography.pptx
Miniproject steganography.pptxMiniproject steganography.pptx
Miniproject steganography.pptx
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 

Steganography

  • 1. STEGANOGRAPHY Presented by : Jitendra Singh Deshwal Under Supervision of: Mr. Satish Kumar Mr. Ravi Saharan
  • 2. Overview • Introduction • History • Problem statement • Objective of the study • Scope • Steganography techniques • LSB algorithm • Design phase • Snapshots • Results and discussion • Conclusion and further enhancement • References
  • 4. Continue  “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  It can be understand by the following figure.
  • 5. History • The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions an example of steganography in the histories of Herodotus. • ancient example is that of histories, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.
  • 6. Continue • During the "Cold War" period, US and USSR wanted to hide their sensors in the enemy's facilities. These devices had to send data to their nations, without being spotted. • In October 2001, the New York Times published an article claiming that al- Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the September 11, 2001 terrorist attack.
  • 7. Problem Statement  How can we send a message secretly to the destination.  Using steganography, information can be hidden in carriers such as images, audio files, text files, videos and data transmissions.  In this study, I proposed a new framework of an image steganography system to hide a digital text of a secret message.
  • 8. Objective of the Study In my project I primarily concentrated on the data security issues when sending the data over the network using steganographic techniques. • The main objectives of the project are • Requirement of this steganography system is that the hider message carried by stego-media should not be sensible to human beings. • The other goal of steganography is to avoid drawing suspicion to the existence of a hidden message. • This approach of information hiding technique has recently become important in a number of application areas.
  • 9. Scope • The scope of the project is to limit unauthorized access and provide better security during message transmission. To meet the requirements, I use the simple and basic approach of steganography. • In this project, the proposed approach finds the suitable algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. • For practically implementing the function of the discussed algorithms, Microsoft .NET framework is used.
  • 10. Steganography Technique Pure steganography: Pure steganography is the process of embedding the data into the object without using any private keys. This type of steganography entirely depends upon the secrecy. This type of steganography uses a cover image in which data is to be embedded, personal information to be transmitted, and encryption decryption algorithms to embed the message into image.
  • 11. LSB Algorithm • LSB (Least Significant Bit) substitution is the process of adjusting the least significant bit pixels of the carrier image. • It is a simple approach for embedding message into the image. • The Least Significant Bit insertion varies according to number of bits in an image. • For an 8 bit image, the least significant bit i.e., the 8th bit of each byte of the image is changed to the bit of secret message. • For 24 bit image, the colors of each component like RGB (red, green and blue) are changed. • LSB is effective in using BMP images since the compression in BMP is lossless
  • 12. How LSB Works Structure of text file: Any text file consists of streams of characters , each character is 1 byte (ASCII code) each byte as all of us of course know consists of 8 bits .
  • 15. Continue • If we want to hide the data like “Aha!” Then we convert the message “Aha!” into ASCII Code and then there equivalent binary code. A=65 (01000001) h=104(01101000) a=97(01100001) !=33(00100001) • See the above diagram for seeing the changes in bits
  • 17. Design Phase Start Application Encryption Decryption Image file BMP image file Image Message file Image Messagefile Figure: Block diagram for Steganography
  • 18. Continue • ENCRYPTION PHASE: The “Encryption phase” uses two types of files for encryption purpose. One is the secret file which is to be transmitted securely, and the other is a carrier file such as image. In the encryption phase the data is embedded into the image. Figure: Encryption Phase Process
  • 19. Continue • DECRYPTION PHASE: The Decryption phase is reverse to encryption phase. In decryption phase, the carrier image in which the data is hided is given as an input file. decryption section uses the “Least Significant bit Algorithm” (LSB) by which the encoded bits in the image is decoded and turns to its original state and gives the output as a text document. Figure: Decryption Phase Process
  • 26. Results and Discussion • In this project I mainly concentrated on embedding the data into an image. I have designed the steganographic application which embedded the data into the image. • Normally, after embedding the data into the image, the image may lose its resolution. In the proposed approach, the image remains unchanged in its resolution as well in size. • The speed of embedding the data into the image is also high in the proposed approach such that the image is protected and the data to the destination is sent securely. • For the decryption phase, I have used the same .NET programming language for the purpose of designing. • There are many steganographic algorithms available like JSteg, F5 and LSB algorithms. I have used the Least Significant Bit algorithm in designing the steganographic application because LSB algorithm works efficiently when we consider bit map images .bmp files. The speed of embedding is also high when using LSB compared to the JSteg algorithm.
  • 27. Conclusion and Further Enhancement • In the present world, the data transfers using internet is rapidly growing because it is so easier as well as faster to transfer the data to destination. So, many individuals and business people use to transfer business documents, important information using internet. • Security is an important issue while transferring the data using internet because any unauthorized individual can hack the data and make it useless or obtain information un- intended to him. • The future work on this project is to improve the compression ratio of the image to the text. This project can be extended to a level such that it can be used for the different types of image formats like .bmp, .jpeg, .tif etc., in the future. The security using Least Significant Bit Algorithm is good but we can improve the level to a certain extent by varying the carriers as well as using different keys for encryption and decryption.
  • 28. References • Amirthanjan,R. Akila,R & Deepika chowdavarapu, P., 2010. A Comparative Analysis of Image Steganography, International Journal of Computer Application. • Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image. International Journal of Advancements in Technology. • Cox, I. Miller, M. Bloom, J. Fridrich, J & Kalker, T. 2008. Digital watermarking and Steganography.2ndEd. Elsevier. • Obaida Mohammad Awad Al-Hazaimeh Hiding Data in Images Using New Random Technique Department of Information Technology, AL-BALQA Applied University/Al-Huson University College, Irbid, Al-Huson, 50, Jordan. • An Overview of Steganography by Shawn D. Dickman Computer Forensics Term Paper, James Madison University. • A Tutorial Review on Steganography by Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjeet and Poulami Das University of Calcutta. • Exploring Steganography: Seeing the Unseen by Neil F. Johnson Sushil Jajodia George Mason University.