Embedding Secret Data in Color Image Using LSB

Authors

  • AlKunooze University College Al Basra, Iraq

DOI:

https://doi.org/10.32792/jeps.v12i2.191

Keywords:

Image Hiding, Steganography, Cryptography, Least Significant Bits (LSB).

Abstract

Currently, steganography is considered the most powerful technique among other procedures to obscure
the presence of buried information within a cover body. The Greek word steganographic means covered
writing. This term may be considered the most appropriate to bury confidential secret data via internet
correspondence. Steganography technique can be defined as the science of safe electronics transmitting.
So, the aims of the steganography technique are to hide the presence of conveying data from un unwilling
party. Various carrier object formats can be implemented, but color images become the more common
among the other digital object. Currently, a lot of works adopted the image steganography as a cover
object. The contemporary secure image steganography technique offerings a transferring the embedded
confidential information task to the intended end point without being perceived or even suspicious by the
attackers. There exists a large variability of steganographic techniques for fixed secret data in color
images. Some of these techniques are more complicated than others, and each of these methods has
positive and negative considered points. The objective of this work is to give a brief overview of
steganography techniques using color images as a cover object by implementing MATLAB software
using the LSB algorithm. We found that the carrier image keeps the original feature without any
distortion caused by embedded secret information. The performance measured by PSNR and MSE
technique and shown satisfied results.

References

H. N. Shinde, A. S. Raut, S. R. Vidhale, R. V. Sawant, V. A. J. I. J. o. E. Kotkar, and C. Science, “A

Review of Various Encryption Techniques,” International Journal Of Engineering And Computer

Science, vol. 3, no. 09, 2014.

T. A. Obaid, M. J. Khami, and L. G. Shehab, “A classical approach for hiding encryption key in the

same encrypted text document,” Journal of Kufa for Mathematics and Computer, vol. 5, no. 1, pp. 25-

, 2018.

A. M. J. A. M. S. Al-Shatnawi, “A new method in image steganography with improved image

quality,” Applied Mathematical Sciences, vol. 6, no. 79, pp. 3907-3915, 2012.

T. A. Obaid, “Enhanced Least Significant Bit Technique for Hiding a Text Message in an Image

Cover Object,” vol. 10, no. 1, 2019.

U. Lokhande, “An Effective Way of using LSB Steganography in images along with Cryptography,”

International Journal of Computer Applications vol. 88, no. 12, 2014.

A. Tiwari, P. Vashistha, “Information Hiding using Steganography and LSB Technique,”

International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 6, 2020.

J. Roque, and J. M. Minguet, "SLSB: Improving the Steganographic Algorithm LSB." pp. 57-66.

S. Singh, and A. Singh, “A review on the various recent steganography techniques,” 2013.

W. Elmasry, “New LSB-based colour image steganography method to enhance the efficiency in

payload capacity, security and integrity check,” Sādhanā, vol. 43, no. 5, pp. 68, 2018.

P. A. K. Maganbhai, and K. Chouhan, “A study and literature review on image steganography,”

International Journal of Computer Science and Information Technologies, vol. 6, no. 1, pp. 685-688,

A. Fkirin, G. Attiya, and A. J. C. o. A. E. El-Sayed, “Steganography Literature Survey,

Classification and Comparative Study,” Communications on Applied Electronics vol. 5, no. 10, pp.

-22, 2016.

R. J. J. o. C. R. Varalakshmi, “Digital Steganography for Preventing Cybercrime Using Artificial

Intelligence Technology ” Journal of Critical Reviews vol. 7, no. 6, pp. 2020, 2019.

F. Nabi, and M. M. Afzal, “Image Steganography: Critical Findings through Some Novel

Techniques,” International Journal of Innovative Technology and Exploring Engineering.

M. S. Taha, M. S. M. Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, "Combination of

steganography and cryptography: A short survey." p. 052003.

S. Gupta, A. Goyal, and B. Bhushan, “Information hiding using least significant bit steganography

and cryptography,” International Journal of Modern Education and Computer Science, vol. 4, no. 6,

pp. 27, 2012.

M. A. A. Pujari, and M. S. S. Shinde, “Cryptography And Encryption Algorithms For

Information Security,” International Journal of Advance Engineering and Research Development.

T. Moerland, “Steganography and steganalysis,” Leiden Institute of Advanced Computing

Science, 2003.

H. Wang, and S. J. C. o. t. A. Wang, “Cyber warfare: steganography vs. steganalysis,”

Communications of the ACM, vol. 47, no. 10, pp. 76-82, 2004.

A. Choudary, “Steganography Tutorial – A Complete Guide For Beginners,” online website,

K. S., “Steganography: Hiding an image inside another,” 2018.

B. Champakamala, K. Padmini, and D. Radhika, “Least Significant Bit algorithm for image

steganography,” Int. J. Adv. Comput. Technol, vol. 3, no. 4, pp. 5, 2014.

A. Arya, S. J. I. J. o. F. R. i. C. S. Soni, and C. Engineering, “A literature review on various recent

steganography techniques,” International Journal on Future Revolution in Computer Science &

Communication Engineering, vol. 4, no. 1, pp. 143-149, 2018.

A. M. Odat, M. A. J. I. J. o. S. Otair, and Technology, “Image steganography using modified least

significant bit,” Indian Journal of Science and Technology, vol. 9, no. 39, 2016.

Downloads

Published

2023-02-14