SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Association of Scientific Innovation and Research (IASIR)
(An Association Unifying the Sciences, Engineering, and Applied Research)
International Journal of Emerging Technologies in Computational
and Applied Sciences (IJETCAS)
www.iasir.net
IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 134
ISSN (Print): 2279-0047
ISSN (Online): 2279-0055
A Steganography Technique for Hiding Information in Image
Kamred Udham Singh
Department of Computer Science,
Faculty of Science Banaras Hindu University, Varanasi, (U.P.), INDIA
_______________________________________________________________________________________
Abstract: In the area of Information Security, hiding the facts and communication from third parties is the most
important factor of information technology. Security is concerned with the protection and safeguard of that
information which, in its various forms can be identified Information Assets. To protect the Information from the
third party we use the message hiding technique called steganography. Steganography is art and science of
invisible communication. This paper deals with image steganography. For hiding secret information in images,
there are number of steganographic techniques some are more complex than others and all of them
have respective strong and weak points. Various steganographic algorithms like Least Significant Bit (LSB)
algorithm, Jsteg and F5 algorithms, from all of these.We are going to use LSB algorithm. This paper gives a
brief idea and overview of image steganography that make use of Least Significant Bit (LSB) algorithm for
hiding the data into image.
Keywords: Decryption, Encryption, LSB (Least Significant Bit, Steganography), Stego key
__________________________________________________________________________________________
I. Introduction
The most important factor of information technology and communication is the security of information. The
idea of information hiding is not new in the history. Various methods have been developed to hide data in order
to keep the message secret. Sometimes it is not enough to keep the contents of a message secret but it may also
be necessary to keep the existence of the message secret. Steganography is the art and science of invisible
communication of messages. It is implemented by hiding the existence of the communicated information in
image, video and audio. The word steganography is derived from the Greek words “stegos” meaning “cover”
and “grafia” meaning “writing”[1] defining it as “covered writing”. The graphical representation of
Steganography system presented in fig: 1.
Figure: 1
The idea and practice of hiding information has a long history. In Histories the Greek historian Herodotus writes
of a nobleman, Histaeus, who needed to communicate with his son-in-law in Greece. He shaved the head of one
of his most trusted slaves and tattooed the message onto the slave’s scalp. When the slave’s hair grew back the
slave was dispatched with the hidden message [2]. The difference between Steganography and Cryptography is
that the cryptography focuses on keeping the contents of a message secret whereas steganography focuses on
keeping the existence of a message secret [3]. Steganography and cryptography both techniques are protecting
information from undesired parties. There are two other technologies which are related to steganography are
watermarking and fingerprinting. There are three components in steganography structure: Carrier image,
Kamred Udham Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043,
pp. 134-137
IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 135
Message, Key. This paper describes the LSB algorithm used for image steganography to the security potential of
steganography for business and personal use. In this paper, we describe the LSB algorithm used for image
steganography to the security potential of steganography for business and personal use. Section II described
basics of Encryption and Decryption techniques. Section III discuss about compression of image files i.e. lossy
or lossless. In Section IV surveyed of least significant bit (LSB) algorithm and how it works on image files.
Finally, Section V concludes the Paper.
II. Encryption and Decryption
In encryption the secret information is hiding in image file. In Decryption secret information is extract from
image file. When a text message embedded with image a key is needed. This key is used to help in encryption
and it decided that where the information should be hidden in the image. A short text can be use as a key.
III. Image Compressions
Image compression is a process of minimizing the size in bytes of a graphics file without demeaning the quality
of the image. Microsoft Document Imaging Format (MDI) or Tagged Image File Format (TIFF), image
compression is used to reduce the size of the file. There are two types of image compression: lossy and lossless
[4]. These both methods are used to save storage space, but the implementing procedures are distinct. Lossy
image compression creates slighter files by dumping excess image data from the original image. And it also
removes that details which are too tiny for the human eye to differentiate [6].On the other side Lossless image
compression never removes any information from the original image, but instead represents data in
mathematical formulas [6]. The original image’s integrity is maintained and the decompressed image
output is bit-by-bit identical to the original image input [4]. Lossless compression image formats are
GIF (Graphical Interchange Format) and 8-bit and 24 bit BMP (Bitmap) [5]. Lossless image compression
keeps the original digital image intact without the chance of lost.
IV. Concepts of Image File
An image is a collection of numbers of pixels. These pixels are displayed horizontally row by row. The number
of bits in a color scheme, called the bit depth, refers to the number of bits used for each pixel. The smallest bit
depth is 8, it means that there are 8 bits used to describe the color of each pixel. Grayscale images use 8 bits for
each pixel and able to display 256 different colors. Digital color images are stored in 24-bit files and use the
RGB color model that is known as true color. All colors of 24- bit image are most frequently represented as
additive combinations of red (R), blue (B), and green (G), and each primary color is represented by 8 bits. In
one given pixel, there can be 256 different quantities of red, green and blue [7]. We can represent over 16
million colors with 24 bits. The representation of RGB colors in a [R, G, B] format is [0, 0, 0] for black, and
[255, 255, 255] for white. Grayscale colors will be represented by a single number for example black has a
value of 0, white is 255 and light gray is 200
V. Images and Transform Domain
Image steganography techniques are two type first is Image Domain and second is Transform Domain [8]. In
transform domain, images are first transformed and then the message is embedded in the image [10]. Image
domain techniques cover bit-wise methods that apply bit insertion and noise manipulation [11]. Lossless
image compression formats are most suitable for image domain steganography techniques are usually
dependent on the image format [12]. Steganography in the transform domain involves the manipulation of
algorithms and image transforms [11].These methods hide messages in more significant areas of the
cover image, making it more robust [9].
Kamred Udham Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043,
pp. 134-137
IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 136
VI. LEAST SIGNIFICANT BIT TECHNIQUE
Least significant bit (LSB) insertion is a most popular and easy approach to hide information in carrier image
file. In the LSB method byte is replaced with an M‟s bit. This technique is best for image steganography. To the
human eye the stego image will look identical to the carrier image. An image file is simply a file which shows
different colors on the different areas of an image. The most popular image formats that use lossless
compression is 24 Bit BMP (Bitmap), use for hiding information. It is a easier to hide information inside in a
high quality and resolution image. Due to their size 24 Bit images are best for hiding information. But you can
also choose 8 Bit BMP‟s or another image format such as GIF [13]. The least significant bit is used to change
with the bit of secret message. In 24-bit image, one pixel can store 3 bits by changing a bit of each of the red,
green and blue color components. For example we have three adjacent pixels (9 bytes) with the RGB encoding
[14] (figure 4)-
Figure: 4 Figure: 5
Table 1: Advantage of LSB algorithm
Binary representation of number 400 is 110010000 embedded into the least significant bits of this part of the
image. If we overlay these 9 bits over the LSB of the 9 bytes above we get the following (where bits in bold and
underline have been changed) (figure5) Number 400 was embedded into the grid and LSB have changed
according to the embedded message.
VII. LSB algorithm
 Select an image of size M*N for an input.
 The message to be hidden in RGB component only of an image.
 Use a pixel selection filter to obtain the best areas to hide information in the cover image to obtain an
enhanced rate. The filter is applied to Least Significant Bit (LSB) of every pixel to hide information, leaving
most significant bits (MSB).
 After that Message is hidden using Bit Replacement method.
Fig: 6 Algorithm of Least Significant Bit
Benefits of LSB Algoritm: There are two main advantage of Least Significant Bit algorithm which
described in following table:
Message Security
A least significant bit technique uses 24 bit
BMP images, because it is a lossless compression
image formats. In a 24 bit BMP image for hiding the
secret data , there is the need of large cover image.
Before embedding it in digital image message data
is converted in digital image in to byte. So this approach
is secure, prevent from liability.
Reduce Distortion Rate
Mostly images are used in steganography as a cover objects. 24 bit BMP
(Bitmap) is use for hiding information because it is a lossless compression
image formats. To hide the message in image, first it is converted into byte
format and then stored in byte array. After that message is encrypted and then
embeds each bit into the LSB position of each pixel position. This approach
involves change in least significant bit (LSB) of each pixel byte. Hence
reduces the distortion rate that is look of original image.
10010100 00001100 11001001
10010111 00001110 11001011
10011111 00010001 11001011
10010101 00001101 11001000
10010110 00001111 11001010
10011110 00010000 11001010
Kamred Udham Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043,
pp. 134-137
IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 137
VIII. Result and conclusion
In this paper the existing Least Significant Bit Algorithm has been analyzed and found can effectively
hide a message inside a digital image file. There are many applications of image steganography which are used
for secretly and covertly communication. Main use of image steganography is, communication of high- level
or top-secret documents between international governments. Image steganography has many illegal uses as it
can be used by hackers to send viruses and Trojans. Image steganography increase the security of the message
by hiding it in a less obvious location. IT also describes the benefits from approach like security of message
increases and distortion rate has reduced.
References
[1] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/
tmoerl/privtech.pdf
[2] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001
[3] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, October2004
[4] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/
tmoerl/privtech.pdf
[5] Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998
[6] “Reference guide: Graphics Technical Options and Decisions”,http://www.devx.com/projectcool/Article/19997
[7] Owens, M., “Adiscussion of covert channels and steganography”, SANS Institute, 2002
[8] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001
[9] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM,47:10, October2004
[10] Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing, 147:03, June
2000
[11] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of
the 2nd Information Hiding Workshop, April1998
[12] Venkatraman, S., Abraham, A. & Paprzycki, M., “Significance of Steganography on Data Security”, Proceedings of the
International Conference on Information Technology: Coding and Computing, 2004
[13] V. Lokeswara Reddy, Dr.A.Subramanyam, Dr.P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for
Various File Formats”, Int. J. Advanced Networking and Applications 868 Volume: 02, Issue: 05, Pages: 868-872 (2011)
[14] T. Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceeding of the Fifth Annual Information
Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005

Mais conteúdo relacionado

Mais procurados

Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionOptimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionEditor IJMTER
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...IJCSIS Research Publications
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 

Mais procurados (20)

Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
H018114956
H018114956H018114956
H018114956
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data TransmissionOptimized Reversible Data Hiding Technique for Secured Data Transmission
Optimized Reversible Data Hiding Technique for Secured Data Transmission
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
20120140504016
2012014050401620120140504016
20120140504016
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
L045056469
L045056469L045056469
L045056469
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
C010511420
C010511420C010511420
C010511420
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Image steganography
Image steganographyImage steganography
Image steganography
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 

Destaque (19)

Ijetcas14 399
Ijetcas14 399Ijetcas14 399
Ijetcas14 399
 
Ijetcas14 448
Ijetcas14 448Ijetcas14 448
Ijetcas14 448
 
Ijetcas14 523
Ijetcas14 523Ijetcas14 523
Ijetcas14 523
 
Ijetcas14 345
Ijetcas14 345Ijetcas14 345
Ijetcas14 345
 
Ijetcas14 323
Ijetcas14 323Ijetcas14 323
Ijetcas14 323
 
Ijebea14 207
Ijebea14 207Ijebea14 207
Ijebea14 207
 
Ijetcas14 313
Ijetcas14 313Ijetcas14 313
Ijetcas14 313
 
Ijetcas14 361
Ijetcas14 361Ijetcas14 361
Ijetcas14 361
 
Ijetcas14 438
Ijetcas14 438Ijetcas14 438
Ijetcas14 438
 
Ijetcas14 409
Ijetcas14 409Ijetcas14 409
Ijetcas14 409
 
Ijetcas14 444
Ijetcas14 444Ijetcas14 444
Ijetcas14 444
 
Ijetcas14 393
Ijetcas14 393Ijetcas14 393
Ijetcas14 393
 
Ijetcas14 394
Ijetcas14 394Ijetcas14 394
Ijetcas14 394
 
Ijetcas14 446
Ijetcas14 446Ijetcas14 446
Ijetcas14 446
 
Aijrfans14 223
Aijrfans14 223Aijrfans14 223
Aijrfans14 223
 
Ijebea14 211
Ijebea14 211Ijebea14 211
Ijebea14 211
 
Aijrfans14 271
Aijrfans14 271Aijrfans14 271
Aijrfans14 271
 
Aijrfans14 294
Aijrfans14 294Aijrfans14 294
Aijrfans14 294
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 

Semelhante a Ijetcas14 335

An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...IOSR Journals
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitYogeshIJTSRD
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniquestheijes
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorData Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorCSCJournals
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 

Semelhante a Ijetcas14 335 (20)

An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
S4501105108
S4501105108S4501105108
S4501105108
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorData Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value Indicator
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 

Mais de Iasir Journals (20)

ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
 

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Ijetcas14 335

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 134 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 A Steganography Technique for Hiding Information in Image Kamred Udham Singh Department of Computer Science, Faculty of Science Banaras Hindu University, Varanasi, (U.P.), INDIA _______________________________________________________________________________________ Abstract: In the area of Information Security, hiding the facts and communication from third parties is the most important factor of information technology. Security is concerned with the protection and safeguard of that information which, in its various forms can be identified Information Assets. To protect the Information from the third party we use the message hiding technique called steganography. Steganography is art and science of invisible communication. This paper deals with image steganography. For hiding secret information in images, there are number of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Various steganographic algorithms like Least Significant Bit (LSB) algorithm, Jsteg and F5 algorithms, from all of these.We are going to use LSB algorithm. This paper gives a brief idea and overview of image steganography that make use of Least Significant Bit (LSB) algorithm for hiding the data into image. Keywords: Decryption, Encryption, LSB (Least Significant Bit, Steganography), Stego key __________________________________________________________________________________________ I. Introduction The most important factor of information technology and communication is the security of information. The idea of information hiding is not new in the history. Various methods have been developed to hide data in order to keep the message secret. Sometimes it is not enough to keep the contents of a message secret but it may also be necessary to keep the existence of the message secret. Steganography is the art and science of invisible communication of messages. It is implemented by hiding the existence of the communicated information in image, video and audio. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing”[1] defining it as “covered writing”. The graphical representation of Steganography system presented in fig: 1. Figure: 1 The idea and practice of hiding information has a long history. In Histories the Greek historian Herodotus writes of a nobleman, Histaeus, who needed to communicate with his son-in-law in Greece. He shaved the head of one of his most trusted slaves and tattooed the message onto the slave’s scalp. When the slave’s hair grew back the slave was dispatched with the hidden message [2]. The difference between Steganography and Cryptography is that the cryptography focuses on keeping the contents of a message secret whereas steganography focuses on keeping the existence of a message secret [3]. Steganography and cryptography both techniques are protecting information from undesired parties. There are two other technologies which are related to steganography are watermarking and fingerprinting. There are three components in steganography structure: Carrier image,
  • 2. Kamred Udham Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043, pp. 134-137 IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 135 Message, Key. This paper describes the LSB algorithm used for image steganography to the security potential of steganography for business and personal use. In this paper, we describe the LSB algorithm used for image steganography to the security potential of steganography for business and personal use. Section II described basics of Encryption and Decryption techniques. Section III discuss about compression of image files i.e. lossy or lossless. In Section IV surveyed of least significant bit (LSB) algorithm and how it works on image files. Finally, Section V concludes the Paper. II. Encryption and Decryption In encryption the secret information is hiding in image file. In Decryption secret information is extract from image file. When a text message embedded with image a key is needed. This key is used to help in encryption and it decided that where the information should be hidden in the image. A short text can be use as a key. III. Image Compressions Image compression is a process of minimizing the size in bytes of a graphics file without demeaning the quality of the image. Microsoft Document Imaging Format (MDI) or Tagged Image File Format (TIFF), image compression is used to reduce the size of the file. There are two types of image compression: lossy and lossless [4]. These both methods are used to save storage space, but the implementing procedures are distinct. Lossy image compression creates slighter files by dumping excess image data from the original image. And it also removes that details which are too tiny for the human eye to differentiate [6].On the other side Lossless image compression never removes any information from the original image, but instead represents data in mathematical formulas [6]. The original image’s integrity is maintained and the decompressed image output is bit-by-bit identical to the original image input [4]. Lossless compression image formats are GIF (Graphical Interchange Format) and 8-bit and 24 bit BMP (Bitmap) [5]. Lossless image compression keeps the original digital image intact without the chance of lost. IV. Concepts of Image File An image is a collection of numbers of pixels. These pixels are displayed horizontally row by row. The number of bits in a color scheme, called the bit depth, refers to the number of bits used for each pixel. The smallest bit depth is 8, it means that there are 8 bits used to describe the color of each pixel. Grayscale images use 8 bits for each pixel and able to display 256 different colors. Digital color images are stored in 24-bit files and use the RGB color model that is known as true color. All colors of 24- bit image are most frequently represented as additive combinations of red (R), blue (B), and green (G), and each primary color is represented by 8 bits. In one given pixel, there can be 256 different quantities of red, green and blue [7]. We can represent over 16 million colors with 24 bits. The representation of RGB colors in a [R, G, B] format is [0, 0, 0] for black, and [255, 255, 255] for white. Grayscale colors will be represented by a single number for example black has a value of 0, white is 255 and light gray is 200 V. Images and Transform Domain Image steganography techniques are two type first is Image Domain and second is Transform Domain [8]. In transform domain, images are first transformed and then the message is embedded in the image [10]. Image domain techniques cover bit-wise methods that apply bit insertion and noise manipulation [11]. Lossless image compression formats are most suitable for image domain steganography techniques are usually dependent on the image format [12]. Steganography in the transform domain involves the manipulation of algorithms and image transforms [11].These methods hide messages in more significant areas of the cover image, making it more robust [9].
  • 3. Kamred Udham Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043, pp. 134-137 IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 136 VI. LEAST SIGNIFICANT BIT TECHNIQUE Least significant bit (LSB) insertion is a most popular and easy approach to hide information in carrier image file. In the LSB method byte is replaced with an M‟s bit. This technique is best for image steganography. To the human eye the stego image will look identical to the carrier image. An image file is simply a file which shows different colors on the different areas of an image. The most popular image formats that use lossless compression is 24 Bit BMP (Bitmap), use for hiding information. It is a easier to hide information inside in a high quality and resolution image. Due to their size 24 Bit images are best for hiding information. But you can also choose 8 Bit BMP‟s or another image format such as GIF [13]. The least significant bit is used to change with the bit of secret message. In 24-bit image, one pixel can store 3 bits by changing a bit of each of the red, green and blue color components. For example we have three adjacent pixels (9 bytes) with the RGB encoding [14] (figure 4)- Figure: 4 Figure: 5 Table 1: Advantage of LSB algorithm Binary representation of number 400 is 110010000 embedded into the least significant bits of this part of the image. If we overlay these 9 bits over the LSB of the 9 bytes above we get the following (where bits in bold and underline have been changed) (figure5) Number 400 was embedded into the grid and LSB have changed according to the embedded message. VII. LSB algorithm  Select an image of size M*N for an input.  The message to be hidden in RGB component only of an image.  Use a pixel selection filter to obtain the best areas to hide information in the cover image to obtain an enhanced rate. The filter is applied to Least Significant Bit (LSB) of every pixel to hide information, leaving most significant bits (MSB).  After that Message is hidden using Bit Replacement method. Fig: 6 Algorithm of Least Significant Bit Benefits of LSB Algoritm: There are two main advantage of Least Significant Bit algorithm which described in following table: Message Security A least significant bit technique uses 24 bit BMP images, because it is a lossless compression image formats. In a 24 bit BMP image for hiding the secret data , there is the need of large cover image. Before embedding it in digital image message data is converted in digital image in to byte. So this approach is secure, prevent from liability. Reduce Distortion Rate Mostly images are used in steganography as a cover objects. 24 bit BMP (Bitmap) is use for hiding information because it is a lossless compression image formats. To hide the message in image, first it is converted into byte format and then stored in byte array. After that message is encrypted and then embeds each bit into the LSB position of each pixel position. This approach involves change in least significant bit (LSB) of each pixel byte. Hence reduces the distortion rate that is look of original image. 10010100 00001100 11001001 10010111 00001110 11001011 10011111 00010001 11001011 10010101 00001101 11001000 10010110 00001111 11001010 10011110 00010000 11001010
  • 4. Kamred Udham Singh, International Journal of Emerging Technologies in Computational and Applied Sciences, 8(2), March-May, 2043, pp. 134-137 IJETCAS 14-335; © 2014, IJETCAS All Rights Reserved Page 137 VIII. Result and conclusion In this paper the existing Least Significant Bit Algorithm has been analyzed and found can effectively hide a message inside a digital image file. There are many applications of image steganography which are used for secretly and covertly communication. Main use of image steganography is, communication of high- level or top-secret documents between international governments. Image steganography has many illegal uses as it can be used by hackers to send viruses and Trojans. Image steganography increase the security of the message by hiding it in a less obvious location. IT also describes the benefits from approach like security of message increases and distortion rate has reduced. References [1] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf [2] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 [3] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, October2004 [4] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf [5] Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998 [6] “Reference guide: Graphics Technical Options and Decisions”,http://www.devx.com/projectcool/Article/19997 [7] Owens, M., “Adiscussion of covert channels and steganography”, SANS Institute, 2002 [8] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 [9] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM,47:10, October2004 [10] Lee, Y.K. & Chen, L.H., “High capacity image steganographic model”, Visual Image Signal Processing, 147:03, June 2000 [11] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created Using Current Steganography Software”, Proceedings of the 2nd Information Hiding Workshop, April1998 [12] Venkatraman, S., Abraham, A. & Paprzycki, M., “Significance of Steganography on Data Security”, Proceedings of the International Conference on Information Technology: Coding and Computing, 2004 [13] V. Lokeswara Reddy, Dr.A.Subramanyam, Dr.P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”, Int. J. Advanced Networking and Applications 868 Volume: 02, Issue: 05, Pages: 868-872 (2011) [14] T. Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceeding of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005