Embedding Secret Data in Color Image Using LSB
Currently, steganography is considered the most powerful technique among other procedures to obscure
the presence of buried information within a cover body. The Greek word steganographic means covered
writing. This term may be considered the most appropriate to bury confidential secret data via internet
correspondence. Steganography technique can be defined as the science of safe electronics transmitting.
So, the aims of the steganography technique are to hide the presence of conveying data from un unwilling
party. Various carrier object formats can be implemented, but color images become the more common
among the other digital object. Currently, a lot of works adopted the image steganography as a cover
object. The contemporary secure image steganography technique offerings a transferring the embedded
confidential information task to the intended end point without being perceived or even suspicious by the
attackers. There exists a large variability of steganographic techniques for fixed secret data in color
images. Some of these techniques are more complicated than others, and each of these methods has
positive and negative considered points. The objective of this work is to give a brief overview of
steganography techniques using color images as a cover object by implementing MATLAB software
using the LSB algorithm. We found that the carrier image keeps the original feature without any
distortion caused by embedded secret information. The performance measured by PSNR and MSE
technique and shown satisfied results.
H. N. Shinde, A. S. Raut, S. R. Vidhale, R. V. Sawant, V. A. J. I. J. o. E. Kotkar, and C. Science, “A
Review of Various Encryption Techniques,” International Journal Of Engineering And Computer
Science, vol. 3, no. 09, 2014.
T. A. Obaid, M. J. Khami, and L. G. Shehab, “A classical approach for hiding encryption key in the
same encrypted text document,” Journal of Kufa for Mathematics and Computer, vol. 5, no. 1, pp. 25-
A. M. J. A. M. S. Al-Shatnawi, “A new method in image steganography with improved image
quality,” Applied Mathematical Sciences, vol. 6, no. 79, pp. 3907-3915, 2012.
T. A. Obaid, “Enhanced Least Significant Bit Technique for Hiding a Text Message in an Image
Cover Object,” vol. 10, no. 1, 2019.
U. Lokhande, “An Effective Way of using LSB Steganography in images along with Cryptography,”
International Journal of Computer Applications vol. 88, no. 12, 2014.
A. Tiwari, P. Vashistha, “Information Hiding using Steganography and LSB Technique,”
International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 6, 2020.
J. Roque, and J. M. Minguet, "SLSB: Improving the Steganographic Algorithm LSB." pp. 57-66.
S. Singh, and A. Singh, “A review on the various recent steganography techniques,” 2013.
W. Elmasry, “New LSB-based colour image steganography method to enhance the efficiency in
payload capacity, security and integrity check,” Sādhanā, vol. 43, no. 5, pp. 68, 2018.
P. A. K. Maganbhai, and K. Chouhan, “A study and literature review on image steganography,”
International Journal of Computer Science and Information Technologies, vol. 6, no. 1, pp. 685-688,
A. Fkirin, G. Attiya, and A. J. C. o. A. E. El-Sayed, “Steganography Literature Survey,
Classification and Comparative Study,” Communications on Applied Electronics vol. 5, no. 10, pp.
R. J. J. o. C. R. Varalakshmi, “Digital Steganography for Preventing Cybercrime Using Artificial
Intelligence Technology ” Journal of Critical Reviews vol. 7, no. 6, pp. 2020, 2019.
F. Nabi, and M. M. Afzal, “Image Steganography: Critical Findings through Some Novel
Techniques,” International Journal of Innovative Technology and Exploring Engineering.
M. S. Taha, M. S. M. Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, "Combination of
steganography and cryptography: A short survey." p. 052003.
S. Gupta, A. Goyal, and B. Bhushan, “Information hiding using least significant bit steganography
and cryptography,” International Journal of Modern Education and Computer Science, vol. 4, no. 6,
pp. 27, 2012.
M. A. A. Pujari, and M. S. S. Shinde, “Cryptography And Encryption Algorithms For
Information Security,” International Journal of Advance Engineering and Research Development.
T. Moerland, “Steganography and steganalysis,” Leiden Institute of Advanced Computing
H. Wang, and S. J. C. o. t. A. Wang, “Cyber warfare: steganography vs. steganalysis,”
Communications of the ACM, vol. 47, no. 10, pp. 76-82, 2004.
A. Choudary, “Steganography Tutorial – A Complete Guide For Beginners,” online website,
K. S., “Steganography: Hiding an image inside another,” 2018.
B. Champakamala, K. Padmini, and D. Radhika, “Least Significant Bit algorithm for image
steganography,” Int. J. Adv. Comput. Technol, vol. 3, no. 4, pp. 5, 2014.
A. Arya, S. J. I. J. o. F. R. i. C. S. Soni, and C. Engineering, “A literature review on various recent
steganography techniques,” International Journal on Future Revolution in Computer Science &
Communication Engineering, vol. 4, no. 1, pp. 143-149, 2018.
A. M. Odat, M. A. J. I. J. o. S. Otair, and Technology, “Image steganography using modified least
significant bit,” Indian Journal of Science and Technology, vol. 9, no. 39, 2016.
Copyright (c) 2023 Journal of Education for Pure Science- University of Thi-Qar
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Journal of education for Pure Science (Jeds), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (Jeds), University of Thi-Qar.
Journal of education for Pure Science (Jeds), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (Jeds), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.