We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Image Steganography using LSB and LSB+Huffman Code

by Wa'el Ibrahim A. Al-mazaydeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 5
Year of Publication: 2014
Authors: Wa'el Ibrahim A. Al-mazaydeh
10.5120/17370-7896

Wa'el Ibrahim A. Al-mazaydeh . Image Steganography using LSB and LSB+Huffman Code. International Journal of Computer Applications. 99, 5 ( August 2014), 17-22. DOI=10.5120/17370-7896

@article{ 10.5120/17370-7896,
author = { Wa'el Ibrahim A. Al-mazaydeh },
title = { Image Steganography using LSB and LSB+Huffman Code },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 5 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number5/17370-7896/ },
doi = { 10.5120/17370-7896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:27:24.631969+05:30
%A Wa'el Ibrahim A. Al-mazaydeh
%T Image Steganography using LSB and LSB+Huffman Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 5
%P 17-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an important area of research in recent years involving a various number of applications. It is the science of embedding information into cover of the media such as text, image, audio, and video. This paper uses two techniques for Steganography (text into image): Least Significant Bit (LSB) and Least Significant Bit with Huffman code (LSB+HUFF). It uses the zigzag scanning for the two methods to increase the security, and compares the results using Peak Signal to Noise Ratio (PSNR). All images used here is a gray scale images to implement the study; what implemented on gray scale image can be applied on colored image.

References
  1. Prof. S. V. Kamble and Prof. B. G. Warvante. A Review on Novel Image Steganography Techniques. IOSR Journal of Computer Engineering (IOSR-JCE), ISSN: 2278-0661, ISBN: 2278-8727, PP: 01-04.
  2. Hniels Provos and Peter Honeyman. Hide & Seek An Introduction to Steganography. IEEE Computer Society Pub-2003.
  3. József LENTI. STEGANOGRAPHIC METHODS. PERIODICA POLYTECHNICA SER. EL. ENG. VOL. 44, NO. 3–4, PP. 249–258 (2000).
  4. Joyshree Nath, Sankar Das, Shalabh Agarwal, and Asoke Nath. Advanced Steganographic Approach for Hiding Encrypted Secret Message in LSB, LSB+1, LSB+2 and LSB+3 Bits in Non standard Cover Files. International Journal of Computer Applications (0975 – 8887), Volume 14– No. 7, February 2011.
  5. Michael E. Whitman and Herbert J. Mattord. Principles of Information Security. Fourth Edition.
  6. Rafael C. Gonzalez and Richard E. Woods. DIGITAL IMAGE PROCESSING. Third Edition.
  7. Iain E. G. Richardson. H. 264 and MPEG-4 Video Compression.
  8. R. Poornima and R. J. Iswarya. AN OVERVIEW OF DIGITAL IMAGE STEGANOGRAPHY. International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 4, No. 1, February 2013.
  9. Bret Dunbar. Steganographic Techniques and their use in an Open-Systems Environment. SANS Institute Reading Room site, 18 February 2002.
  10. https://www. siggraph. org/education/materials/HyperGraph/video/mpeg/mpegfaq/huffman_tutorial. html. last view 22-7-2014 10:33 am.
Index Terms

Computer Science
Information Sciences

Keywords

Least Significant Bit (LSB) ASCII code Peak Signal to Noise Ratio (PSNR) zigzag scanning