CFP last date
20 January 2025
Reseach Article

Comparison between the basic LSB replacement technique and Increased Capacity of Information Hiding in LSB’s Method for Images

by H. B. Kekre, Dhirendra Mishra, Rhea Khanna, Sakshi Khanna, Aadil Hussaini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 1
Year of Publication: 2012
Authors: H. B. Kekre, Dhirendra Mishra, Rhea Khanna, Sakshi Khanna, Aadil Hussaini
10.5120/6747-8941

H. B. Kekre, Dhirendra Mishra, Rhea Khanna, Sakshi Khanna, Aadil Hussaini . Comparison between the basic LSB replacement technique and Increased Capacity of Information Hiding in LSB’s Method for Images. International Journal of Computer Applications. 45, 1 ( May 2012), 33-38. DOI=10.5120/6747-8941

@article{ 10.5120/6747-8941,
author = { H. B. Kekre, Dhirendra Mishra, Rhea Khanna, Sakshi Khanna, Aadil Hussaini },
title = { Comparison between the basic LSB replacement technique and Increased Capacity of Information Hiding in LSB’s Method for Images },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 1 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number1/6747-8941/ },
doi = { 10.5120/6747-8941 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:36:32.513435+05:30
%A H. B. Kekre
%A Dhirendra Mishra
%A Rhea Khanna
%A Sakshi Khanna
%A Aadil Hussaini
%T Comparison between the basic LSB replacement technique and Increased Capacity of Information Hiding in LSB’s Method for Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 1
%P 33-38
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. This paper presents a comparison between the basic LSB technique which involves replacement of least significant bits in order to hide the colored message image behind the colored cover image, with the other technique for increased capacity of hiding information using an advanced LSB methodology wherein the bit replacement takes place in accordance to range specified for the color images. There have been many techniques for hiding messages in images in such a manner that the alterations made to the images are perpetually indiscernible. This paper proves experimentally that the technique for increased capacity of information hiding in LSB's method gives better performance in all the parameters and is a safe technique for embedding secret messages.

References
  1. Dr. H. B. Kekre, Ms. Archana A. Athawale, "Information Hiding using LSB Technique with Increased Capacity", International Journal of Cryptography and Security, Special issue on Steganography, 2008. (Accepted for publication).
  2. H. C. Wu, N. I Wu, C. S. Tsai and M. S. Hwang, "Image Steganographic scheme based on pixel-value differencing and LSB replacement methods",VISP(152), No. 5, October 2005
  3. Johnson,Neil F,"Steganography", 2000.
  4. J. Fridrich and M. Goljan, "Practical steganalysis of digital images— State of the art," in Proc. SPIE Security Watermarking Multimedia Contents, vol. 4675, E. J. Delp III and P. W. Wong, Eds. , 2002, pp. 1–13.
  5. N. Provos, "Defending Against Statistical Steganalysis", 10th USENIX Security Symposium, Washington, DC, 2001.
  6. A. Westfeld and A. Pfitzmann, "Attacks on Steganographic Systems," Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, 2000, pp. 61–75.
  7. W. Dixon, F. Massey: Introduction to Statistical Analysis. McGraw-Hill Book Company, Inc. , New York 1957.
  8. A. Ker, "Steganalysis of LSB Matching in Grayscale Images. " IEEE Signal Processing Letters, vol. 12(6), 2005.
  9. N. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, pp. 26-34, Feb 1998.
  10. X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Process. Lett. , vol. 12, no. 1, pp. 67–70, Jan. 2005.
  11. Petitcolas F, Anderson R, Kuhn M: 'Information Hiding – A Survey' Proceedings of the IEEE, Vol. 87. July 1999.
  12. Neeta, D,"Implementation of LSB Steganography and Its Evaluation for Various Bits" Dept. of Computer. Sci.
  13. V. Lokeswara Reddy,"Implementation of LSB Steganography and its Evaluation for Various File Formats" Department of CSE, K. S. R. M. College of Engg. ,
  14. B. Schneier, "Terrorists and Steganography", 24 Sep,01.
  15. R. Chandramouli and Nasir Memon, "Analysis of LSB Based Image Steganography Techniques", IEEE 2001.
  16. Niels Provos and Peter Honeyman, University of Michigan, "Hide and Seek: An Introduction to Steganography" Computer Society IEEE Security & Privacy.
  17. Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia "Application of LSB Based Steganographic Technique for 8-bit Color Images" World Academy of Science, Engineering and Technology 50 2009.
  18. Eric Cole ,"Hiding in Plain Sight: Steganography and the Art of Covert Communication"
  19. Hiding data in images by simple LSB substitution, Chi-Kwong Chan?, L. M. Cheng Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong.
  20. Data Hiding in Images by Hybrid LSB Substitution Chin-Chen Chang Hsien-Wen Tseng ,Dept. of Inf. Eng. & Computer. Sci. , Feng Chia Univ,Taiwan.
Index Terms

Computer Science
Information Sciences

Keywords

Information Hiding Lsb Increased Capacity Steganography