CFP last date
20 December 2024
Reseach Article

Comparison of Steganography at One LSB and Two LSB Positions

by R.s. Gutte, Y.d. Chincholkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 11
Year of Publication: 2012
Authors: R.s. Gutte, Y.d. Chincholkar
10.5120/7668-0949

R.s. Gutte, Y.d. Chincholkar . Comparison of Steganography at One LSB and Two LSB Positions. International Journal of Computer Applications. 49, 11 ( July 2012), 1-7. DOI=10.5120/7668-0949

@article{ 10.5120/7668-0949,
author = { R.s. Gutte, Y.d. Chincholkar },
title = { Comparison of Steganography at One LSB and Two LSB Positions },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 11 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number11/7668-0949/ },
doi = { 10.5120/7668-0949 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:59.054147+05:30
%A R.s. Gutte
%A Y.d. Chincholkar
%T Comparison of Steganography at One LSB and Two LSB Positions
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 11
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The use of Internet has been extensively increased. Sometimes, it is needed to keep the information secret and secure without attracting the attention of unauthorized person. Here, we proposed Text Steganography method along with cryptography for secret communication. It uses a simple method of steganography which is the data hiding at LSB positions. We compared the data hiding at one LSB and two LSB positions and evaluated the performance parameters like Standard Deviation, MSE and Entropy etc. The hiding of data at LSB positions is not fixed therefore it is a stronger approach. The data is encrypted using Extended Square Substitution Algorithm. It covers all the alphabets, special characters and mathematical symbols like µ, ß, þ, Ø. Each pixel of the image is considered as a byte. The encrypted text is then embedded at LSB positions of each pixel and the carrier image after embedding the data is called Stego image. The stego image is then transmitted and the secret data is then successfully extracted at the receiver. The MATLAB has been used for implementation.

References
  1. Gurusubramani, T. Prabahar Godwin James, Venkatesh "Enhancing the Impregnability of Text Messages at Multiple Levels" Proceedings published in International Journal of Computer Applications (IJCA) 2012,pp. 28-31.
  2. Mohammad Ali Bani Younes and Aman Jantan, "A New Steganography Approach for Image Encryption Exchange by using the LSB insertion", International Journal of Computer Science and Network Security, Vol 8, No 6,2008, pp. 247-254.
  3. Joachim J. Eggers, R. Bauml and Bernd Girod, "A Communications Approach to image steganography", Proc. Of SPIE Volume 4675, San Jose, Ca, 2002, pp. 1-12.
  4. Abbas Cheddad, Joan CondellKevinCurran, PaulMcKevitt "Digital image steganography: Survey and analysis of current methods", Elsevier Journal of Signal Processing 2010, pp. 727–752.
  5. Ross J. Anderson and Fabian A. P. Petitcolas, "On The Limits of steganography", IEEE Journal of selected Areas in communication, Vol. 16, No. 4, 1998, pp. 474-481.
  6. H. Motameni, M. Norouzi, M. Jahandar. and A. Hatami, "Labeling method in Steganography", Proc. of world academy of science, engineering and technology, Vol. 24, 2007, pp. 349-354.
  7. Po Yuch Chen and Hung Ju Lin, "A DWT Based Approach for Image Steganography", International journal of Applied Science and Engineering, Vol. 4, No. 3, 2006, pp. 275-290.
  8. P. Mohan Kumar and D. Roopa, "An Image Steganography Framework with Improved Tamper Proofing", Asian Journal of Information Technology, Vol. 6, No. 10, 2007, pp. 1023-1029.
  9. Hardik J. Patel and Preeti K. Dave, "Least Significant Bits Based Steganography Technique", International Journal of Electronics Communication and Computer Engineering (IJECCE-2012) pp. 44-50.
  10. Gurusubramani, T. Prabahar Godwin James, Venkatesh "Enhancing the Impregnability of Text Messages at Multiple Levels" Proceedings published in International Journal of Computer Applications (IJCA) 2012,pp. 28-31.
  11. Lisa M. Marvel and Charles G. Boncelet, "Spread Spectrum Image Steganography", IEEE Transactions on Image Processing, Vol. 8, No. 8, 1999, pp. 1075-1083.
  12. Ran-Zan Wang and Yeh-Shun Chen, "High Payload Image Steganography Using two-Way Block Matching", IEEE Signal Processing letters, Vol. 13, No. 3, 2006, pp161-164.
  13. Xinpeng Zhang, Shuozhong Wang and Zhenyu Zhou, "Multibit Assignment Steganography in Palette Images",IEEE Signal Processing Transactions, Vol. 15, 2008, pp. 553-556.
  14. Weiming Zhang, Xinpeng Zhang and Shuozhong Wang, "A Double layered Plus-Minus One data Embedding Scheme", IEEE Signal Processing Letters, Vol. 14, No. 11, 2007. pp. 848-851.
  15. Alvaro Martin, Guillermo Sapiro and Gadiel Seroussi, "Is steganography Natural", IEEE Transactions on Image processing, Vol. 14, No. 12, 2005. pp. 2040-2050.
  16. H. Rifa-Pous and J. Rifa, "Product Perfect Codes and Steganography", Digital Signal Processing, Vol. 19, 2009, pp. 764-769.
  17. Piyush Marwaha, Paresh Marwaha, "Visual Cryptographic Steganography in images", Second IEEE conference on Computing, Communication and Networking Technologies 2010,PP. 193-206.
  18. Mohammad Shirali-Shahreza, "Steganography in MMS" Multitopic Conference, INMIC IEEE International 2007,pp. 1-4. S.
  19. Gandharba Swain, Saroj Kumar Lenka, "Better Steganography using the Six Square Cipher Algorithm", Proc. of International Conference on Advances and Emerging Trends in Computing Technologies (ICAET-2010), Chennai, India, 2010, pp. 334-338.
  20. Gandharba Swain and Saroj Kumar Lenka, "Steganography Using the Twelve Square Substitution Cipher and an Index Variable", IEEE transactions on Image Processing, 2011, pp. 84-88.
  21. R. S. Gutte, Y. D. Chincholkar, "The Twelve Square Substitution Cipher Algorithm based Steganography using MATLAB", Proc. of National level Conference on Emerging Trends in Electronics & Telecommunication at MITCOE, Pune, India, 2011, pp. 44-49.
Index Terms

Computer Science
Information Sciences

Keywords

Extended square substitution cipher algorithm