CFP last date
20 December 2024
Reseach Article

Image Steganography using LSB, LSB+Huffman Code, and LSB+Arithmetic Code

by Wa'el Ibrahim A. Almazaydeh, H. S. Sheshadri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 11
Year of Publication: 2016
Authors: Wa'el Ibrahim A. Almazaydeh, H. S. Sheshadri
10.5120/ijca2016911478

Wa'el Ibrahim A. Almazaydeh, H. S. Sheshadri . Image Steganography using LSB, LSB+Huffman Code, and LSB+Arithmetic Code. International Journal of Computer Applications. 155, 11 ( Dec 2016), 1-7. DOI=10.5120/ijca2016911478

@article{ 10.5120/ijca2016911478,
author = { Wa'el Ibrahim A. Almazaydeh, H. S. Sheshadri },
title = { Image Steganography using LSB, LSB+Huffman Code, and LSB+Arithmetic Code },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 11 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number11/26646-2016911478/ },
doi = { 10.5120/ijca2016911478 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:58.144538+05:30
%A Wa'el Ibrahim A. Almazaydeh
%A H. S. Sheshadri
%T Image Steganography using LSB, LSB+Huffman Code, and LSB+Arithmetic Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 11
%P 1-7
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The digital world is growing day by day; many new risks have emerged during the exchange of information around the world; and many ways have evolved to protect the information. In this paper, this paper will conceal information into an image by using three methods that concentrate on the compression of the date before hiding it into the image and then compare the results using Peak Signal to Noise Ratio (PSNR). The three methods that will be used are Least Significant Bit (LSB), Huffman Code, and Arithmetic Coding and then the result will be compared.

References
  1. Wa'el Ibrahim A. Al-Mazaydeh. Image Steganography using LSB and LSB+Huffman Code. International Journal of Computer Applications (0975 – 8887), Volume 99– No.5, August 2014.
  2. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Forth Edition.
  3. Dharmesh Mistry, Richa Desai, and Megh Jagad. Hidden Data Transmission using Image Steganography. International Journal of Computer Applications (0975 – 8887), Volume 130 – No.14, November 2015.
  4. www.rfwireless-world.com. Difference between lossless data compression vs lossy data compression. http://www.rfwireless-world.com/Terminology/lossless-data-compression-vs-lossy-data-compression.html. [Accessed: 24-august-2016]
  5. Abhishek Koluguri, Text Steganography Methods and its Tools, International Journal of Advanced Scientific and Technical Research, Issue 4 volume 2, March-April 2014.
  6. K.Thangadurai and G.Sudha Devi, 2014 International Conference on Computer Communication and Informatics (ICCCI -2014), Jan. 03 – 05, 2014, Coimbatore, INDIA. 2014 IEEE.
  7. www.siggraph.org. A quick tutorial on generating a huffman tree https://www.siggraph.org/education/materials/HyperGraph/video/mpeg/mpegfaq/huffman_tutorial.html. [Accessed : 2-august-2016]
  8. Sukhpreet Kaur, Vanita Rani. Designing an Efficient Image Encryption-Compression System using a New HAAR, SYMLET and COIFLET Wavelet Transform. International Journal of Computer Applications (0975 – 8887) Volume 129 – No.15, November2015.
  9. Iain E. G. Richardson. H.264 and MPEG-4 Video Compression, The Robert Gordon University, Aberdeen, UK 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Least Significant Bit (LSB) Arithmetic Coding ASCII code PSNR zigzag scanning