CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

An Overview of Image Steganography using LSB Technique

Published on May 2012 by Jayeeta Majumder, Sweta Mangal
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 3
May 2012
Authors: Jayeeta Majumder, Sweta Mangal
c1784a4f-9c92-4c10-ac78-cbea45c95777

Jayeeta Majumder, Sweta Mangal . An Overview of Image Steganography using LSB Technique. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 3 (May 2012), 10-13.

@article{
author = { Jayeeta Majumder, Sweta Mangal },
title = { An Overview of Image Steganography using LSB Technique },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 3 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 10-13 },
numpages = 4,
url = { /proceedings/ncacsa/number3/6492-1017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A Jayeeta Majumder
%A Sweta Mangal
%T An Overview of Image Steganography using LSB Technique
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 3
%P 10-13
%D 2012
%I International Journal of Computer Applications
Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. This paper intends to give an overview of image steganography, its uses and techniques. For a more secure approach, this paper encrypts the message using secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one. The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. This paper deals with the algorithm based on hiding a large amount of data (image, audio, text) file into color BMP image. This project gives a brief idea about the image steganographic approach that make use of Least Significant Bit(LSB) algorithm for embedding the data into the bitmap image(. bmp) which is implemented through the JDK 1. 5. 0_07 environment. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file.

References
  1. S-Tools (http:// digitalforensics. champlain. edu/ download/ s-tools 4. zip).
  2. Chandramouli, R. and N. Memon, 2001. Analysis of LSB based image steganography techniques. Proc. of ICIP, Thessaloniki, Greece.
  3. Dumitrescu, S. , W. Xiaolin and Z. Wang, 2003. Detection of LSB steganography via sample pair analysis. In: LNCS, Vol. 2578, Springer-Verlag, New York, pp: 355–372.
  4. Ahn, L. V. and N. J. Hopper, 2004. Public-key steganography. In Lecture Notes in Computer Science. Vol. 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pp: 323–341. Springer-Verlag Heidelberg.
  5. Pang, H. H. , K. L. Tan and X. Zhou, 2004. Steganographic schemes for file system and b-tree. IEEE Trans. on Knowledge and Data Engineering, 16: 701–713.
  6. Dobsicek, M. , 2004. Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering. FEE CTU.
  7. Mittal, U. and N. Phamdo, 2002. Hybrid digitalanalog joint source-channel codes for broadcasting and robust communications. IEEE Trans. on Info. Theory, 48: 1082 –1102.
  8. Pavan, S. , S. Gangadharpalli and V. Sridhar, 2005. Multivariate entropy detector based hybrid image registration algorithm. IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, pp: 18-23.
  9. Moulin, P. and J. A. O'Sullivan, 2003. Informationtheoretic analysis of information hiding. IEEE Trans. on Info. Theory, 49: 563–593.
  10. Amin, P. , N. Liu and K. Subbalakshmi, 2005. Statistically secure digital image data hiding. IEEE Multimedia Signal Processing MMSP05, China.
  11. Jackson, J. , G. Gunsch, R. Claypoole and G. Lamont, 2004. Detecting novel steganography with an anomaly- based strategy. J. Electr. Imag. , 13: 860– 870.
  12. Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs "Implementation of LSB Steganography and Its Evaluation for Various Bits" Digital Information Management, 2006 1st International conference. pp 173-178,2007.
  13. C. Cachin, "An Information-Theoretic Model for Steganography", in proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, 1998.
  14. F. A. P Peticolas, R. J. Anderson and M. G. Kuhn, "Information Hiding – A Survey", in proceeding of IEEE, pp. 1062-1078, July 1999.
  15. M. M. Amin, M. Salleh, S. Ibrahim, et al. , "Information Hiding Using Steganography", 4th National Conference On Telecommunication Technology Proceedings (NCTT2003), Shah Alam, Malaysia, pp. 21-25, January 14-15, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Steganalysis Stego Image Cover Medium Lsb Technique