Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of Image Steganography with Least Significant Bit Insertion for Secure Communication

Simran Kaur, Neetika Soni

Abstract


Data hiding is a methodology of hiding secret message into a cover media such that an illegal observer does not predicts the presence of the existence of the hidden messages. It defines a group of processes used to embed data, into different forms of media such as audio, image or text. Data hiding, while similar to compression, is different from encryption. This new method is called steganography. In this one is the message image and other is the cover image. We can hide our message image in the cover image by using bit shifting method. Characteristics of cover image will not change so there will be no evidence of the presence of message inside an image. We can decode this and at the end we can separate the message image and the cover image. The methods which are initially proposed like, cryptography, water marking etc. are not readable but the existence of secret is evidenced, so one can easily notice that some sort of data has been transferred. Also, the security mechanism of these methods can be easily broken. Hence previous methods lack in providing complete security for data transfer.

So this paper is organized in different sections. First section explains the different type of images. Second section explains the data hiding techniques followed by a section that explains steganography. Last section includes the results and discussions.


Keywords


Cryptography, Data Hiding, Image Steganography, Steganography.

Full Text:

PDF

References


M. D. Swanson, B. Zhu and A. H. Tewfik, “Robust Data Hiding for Images,” IEEE Digital Signal Processing Workshop, Department of Electrical Engineering, University of Minnesota, pp. 37-40.

Y. Chung and F. Xu “Development of video watermarking for MPEG2 video (2006)” City university of Hong Kong, IEEE.

I. Venkata and S. Manoj, “Cryptography and Steganography, International Journal of Computer Applications (0975 – 8887),vol 1, no.12.

C. Jonathan, D.Patrick, L Samuel and P Robert (2001) “Steganography and Digital Watermarking”, School of Computer Science, The University of Birmingham.

C. Cachin (1998) “An Information Theoretic Model for Steganography”, Proceedings of 2nd workshop on Information hiding”, MIT Laboratory for Computer Science, May.

S. Channalli and A. Jadhav (2009) “Steganograpy: An Art of Hiding data”, International Journal on Computer Science and Engineering, vol.1 (3), pp. 137-141.

S.A. Laskar and K. Hemachandran (2012) “High Capacity data hiding using LSB steganography and encryption”, International Journal of Database Management Systems, vol.4, no. 6.

F.M. Shelke, A. A. Dongre, P. D. Soni (2014) “Comparison of different techniques for Steganography in images”, International Journal of Application or Innovation in Engineering & Management vol. 3, Issue 2, pp.171-176.

J. Kaur, Inderjeet and M. Duhan (2009) “A comparative analysis of steganographic techniques”, International Journal of Information Technology and Knowledge Management, vol. 2, no. 1, pp. 191-194.

K. Vyas1, B.L.Pal (2014) “A Proposed Method In Image Steganography To Improve Image Quality With LSB Technique”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, Issue 1, pp. 5246-5252.

M. S. Subhedar, V. H. Mankar (2014) “Current status and key issues in image steganography: A survey”, (Elsevier) Computer Science Review 13-14, pp. 95-113.

R. Chandramouli and N. Memon (2001) “Analysis of LSB based image steganography techniques”, IEEE Article, pp. 1019-1022.

R. Yadav (2011) “A novel approach for image steganography in spatial domain using last two bits of pixel values”, International Journal of Security, vol. 5, Issue 2, pp. 51-61.

S. S. Priya, K.Mahesh and K. Kuppusamy (2012) “Efficient steganography method to implement selected least significant bits in spatial domain”, International Journal of Engineering Research and Applications, vol. 2, Issue 3, pp. 2632-2637.

W. Bender, D. Gruhl and A. Lu (1996) “Techniques for data hiding”, IBM Syst. Journal, vol. 35, no. 3-4, pp. 313–336.


Refbacks

  • There are currently no refbacks.