Embedding Secret Data in Color Image Using LSB
DOI:
https://doi.org/10.32792/jeps.v12i2.191Keywords:
Image Hiding, Steganography, Cryptography, Least Significant Bits (LSB).Abstract
Currently, steganography is considered the most powerful technique among other procedures to obscure
the presence of buried information within a cover body. The Greek word steganographic means covered
writing. This term may be considered the most appropriate to bury confidential secret data via internet
correspondence. Steganography technique can be defined as the science of safe electronics transmitting.
So, the aims of the steganography technique are to hide the presence of conveying data from un unwilling
party. Various carrier object formats can be implemented, but color images become the more common
among the other digital object. Currently, a lot of works adopted the image steganography as a cover
object. The contemporary secure image steganography technique offerings a transferring the embedded
confidential information task to the intended end point without being perceived or even suspicious by the
attackers. There exists a large variability of steganographic techniques for fixed secret data in color
images. Some of these techniques are more complicated than others, and each of these methods has
positive and negative considered points. The objective of this work is to give a brief overview of
steganography techniques using color images as a cover object by implementing MATLAB software
using the LSB algorithm. We found that the carrier image keeps the original feature without any
distortion caused by embedded secret information. The performance measured by PSNR and MSE
technique and shown satisfied results.
References
H. N. Shinde, A. S. Raut, S. R. Vidhale, R. V. Sawant, V. A. J. I. J. o. E. Kotkar, and C. Science, “A
Review of Various Encryption Techniques,” International Journal Of Engineering And Computer
Science, vol. 3, no. 09, 2014.
T. A. Obaid, M. J. Khami, and L. G. Shehab, “A classical approach for hiding encryption key in the
same encrypted text document,” Journal of Kufa for Mathematics and Computer, vol. 5, no. 1, pp. 25-
, 2018.
A. M. J. A. M. S. Al-Shatnawi, “A new method in image steganography with improved image
quality,” Applied Mathematical Sciences, vol. 6, no. 79, pp. 3907-3915, 2012.
T. A. Obaid, “Enhanced Least Significant Bit Technique for Hiding a Text Message in an Image
Cover Object,” vol. 10, no. 1, 2019.
U. Lokhande, “An Effective Way of using LSB Steganography in images along with Cryptography,”
International Journal of Computer Applications vol. 88, no. 12, 2014.
A. Tiwari, P. Vashistha, “Information Hiding using Steganography and LSB Technique,”
International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 6, 2020.
J. Roque, and J. M. Minguet, "SLSB: Improving the Steganographic Algorithm LSB." pp. 57-66.
S. Singh, and A. Singh, “A review on the various recent steganography techniques,” 2013.
W. Elmasry, “New LSB-based colour image steganography method to enhance the efficiency in
payload capacity, security and integrity check,” Sādhanā, vol. 43, no. 5, pp. 68, 2018.
P. A. K. Maganbhai, and K. Chouhan, “A study and literature review on image steganography,”
International Journal of Computer Science and Information Technologies, vol. 6, no. 1, pp. 685-688,
A. Fkirin, G. Attiya, and A. J. C. o. A. E. El-Sayed, “Steganography Literature Survey,
Classification and Comparative Study,” Communications on Applied Electronics vol. 5, no. 10, pp.
-22, 2016.
R. J. J. o. C. R. Varalakshmi, “Digital Steganography for Preventing Cybercrime Using Artificial
Intelligence Technology ” Journal of Critical Reviews vol. 7, no. 6, pp. 2020, 2019.
F. Nabi, and M. M. Afzal, “Image Steganography: Critical Findings through Some Novel
Techniques,” International Journal of Innovative Technology and Exploring Engineering.
M. S. Taha, M. S. M. Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, "Combination of
steganography and cryptography: A short survey." p. 052003.
S. Gupta, A. Goyal, and B. Bhushan, “Information hiding using least significant bit steganography
and cryptography,” International Journal of Modern Education and Computer Science, vol. 4, no. 6,
pp. 27, 2012.
M. A. A. Pujari, and M. S. S. Shinde, “Cryptography And Encryption Algorithms For
Information Security,” International Journal of Advance Engineering and Research Development.
T. Moerland, “Steganography and steganalysis,” Leiden Institute of Advanced Computing
Science, 2003.
H. Wang, and S. J. C. o. t. A. Wang, “Cyber warfare: steganography vs. steganalysis,”
Communications of the ACM, vol. 47, no. 10, pp. 76-82, 2004.
A. Choudary, “Steganography Tutorial – A Complete Guide For Beginners,” online website,
K. S., “Steganography: Hiding an image inside another,” 2018.
B. Champakamala, K. Padmini, and D. Radhika, “Least Significant Bit algorithm for image
steganography,” Int. J. Adv. Comput. Technol, vol. 3, no. 4, pp. 5, 2014.
A. Arya, S. J. I. J. o. F. R. i. C. S. Soni, and C. Engineering, “A literature review on various recent
steganography techniques,” International Journal on Future Revolution in Computer Science &
Communication Engineering, vol. 4, no. 1, pp. 143-149, 2018.
A. M. Odat, M. A. J. I. J. o. S. Otair, and Technology, “Image steganography using modified least
significant bit,” Indian Journal of Science and Technology, vol. 9, no. 39, 2016.
Downloads
Published
Issue
Section
License
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/