CFP last date
20 January 2025
Reseach Article

An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

by Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 13
Year of Publication: 2013
Authors: Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade
10.5120/13547-1342

Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade . An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution. International Journal of Computer Applications. 77, 13 ( September 2013), 37-45. DOI=10.5120/13547-1342

@article{ 10.5120/13547-1342,
author = { Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade },
title = { An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 13 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number13/13547-1342/ },
doi = { 10.5120/13547-1342 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:12.661111+05:30
%A Ankit Chadha
%A Neha Satam
%A Rakshak Sood
%A Dattatray Bade
%T An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 13
%P 37-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when n<=4, because of better PSNR which is achieved by this technique. The final results obtained after steganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

References
  1. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd Edition, Morgan Kaufmann, 2008, p. 31.
  2. Y. K. Lee, L. H. Chen, High capacity image steganography model, Proc. Inst. Elect. Eng. Vis. Image, Signal Processing 147 (3) (2000), pp. 288–294.
  3. S. J. Wang, Steganography of capacity required using modulo operator for embedding secret images, Appl. Math. Comput. 164 (2005), pp. 99–116.
  4. Nedeljko Cvejic, Algorithms for audio watermarking and steganography, Oulu University Press, Oulu 2004, pp. 40-42.
  5. Z. Wang and A. C. Bovik, "Mean squared error: love it or leave it? - A new look at signal fidelity measures," IEEE Signal Processing Magazine, Vol. 26, No. 1, pp. 98-117, January 2009.
  6. J. Liu and Z. Lu, "A Multipurpose Audio Watermarking Algorithm Based on Vector Quantization in DCT Domain," World Academy of Science, Engineering and Technology (WASET), Issue 55, July 2009, pp. 399-404.
  7. R. Ravula, M. S. Thesis, Department of Electrical and Computer Engineering, Louisiana State University and Agricultural and Mechanical College, "Audio Watermarking using Transformation Techniques," pp. 8-51.
  8. Y. Yan, H. Rong, and X. Mintao, "A Novel Audio Watermarking Algorithm for Copyright Protection Based on DCT Domain," Second International Symposium on Electronic Commerce and Security, China, May 2009, pp. 184 - 188.
  9. Ali Al-Haj , Ahmad Mohammad and Lama Bata, DWT–Based Audio Watermarking, The International Arab Journal of Information Technology, Vol. 8, No. 3, July 2011, pp. 326-333.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography data hiding LSB manipulation MSE PSNR