A Survey on Image Steganography Using Lsb Substitution Technique

نویسندگان

  • Beenish Siddiqui
  • Sudhir Goswami
چکیده

Beenish Siddiqui1, Sudhir Goswami 3 1Student, Department of CSE, M.tech, Meerut Institute of Engg. & Technology, Uttar Pradesh, India. 2Associate Professor, Department of CSE, Meerut Institute of Engg & Technology, Uttar Pradesh, India. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract: Information security is one of the believable areas of research now-a-days. Steganography plays a shiny role in the information security. Its main aim is to covering sensitive information within a host such that the information existence remains confidential. By embedding secret message within other file steganography plays an important role of hiding messages for security purpose. The least significant bit (LSB) is one of the most important and simple method when one want to solve such problems. In this method, a number of bits of LSB is directly replaced by each pixel of the cover image with the embedded message. This paper describes the various techniques using the LSB substitution method to hide the data in images. Image steganography hides the data efficiently and effectively with the help of LSB substitution methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability

In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.

متن کامل

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

A Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with Watermarking: A Survey

Today’s large demand of internet applications requires data to be transmitted in a better manner. Data is transferred in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the better solution for this issue is Steganography, which is the technique of writing hidden messages in such a way that no one, apart from the sender and main rec...

متن کامل

New Approach for Steganography in Color Images with an Improved Psnr and Lsb Techniques

Steganography is an art and science of writing hidden message in the cover image. This paper proposes a new approach for a steganography in color image based on detection technique combining two transform for dividing an image into edge and smooth areas. LSB insertion techniques are used to hide information at the edge areas whereas another LSB substitution technique is used to hide message at ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017