FUNDAMENTALS FOR STEGANOGRPHY USING LEAST SIGNIFICANT BIT ALGORITHM

Authors

  • BOBBY .S Assistant Professor, Department of Computer Science, St. Joseph's College of Arts and Science for Women, Hosur, Tamil Nadu.

Keywords:

Steganography, Security, Digital information, LSB

Abstract

This paper development of multimedia and internet allows for wide distribution of digital media data. It becomes easier to edit, modify and duplicate digital information. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the
information. Steganography considers one of the techniques which used to protect the important information. The main goals for this paper to recognize the researchers for the main fundamentals of steganography. In this paper provides a general overview of steganography ,types, characterization of steganography techniques. The Least Significant Bit(LSB) is one of the main techniques in spatial domain image steganography. A new technique of LSB steganography has been proposed which is an improvised version of one bit LSB technique. This paper reviews the LSB algorithm used for image steganography to the security potential of steganography for business and personal use.

References

Hidden Data in PE-File with in Unused Area One”, International Journal of Computer and Electrical Engineering (IJCEE), Vol.1, No.5,ISSN: 1793-8198, p.p 669-678.

A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", World Academy of Science Engineering and Technology(WASET), Vol.54, ISSN: 2070-3724, P.P 468-479.

A.A.Zaidan, B.B.Zaidan, “Novel Approach for High Secure Data Hidden in MPEG Video Using Public Key Infrastructure”, International Journal of Computer and Network Security, 2009, Vol.1 No.1, ISSN: 1985-1553, P.P 71-76.

Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B.Zaidan, A.A.Zaidan,"A Novel Embedding Method to Increase Capacity of LSB Audio Steganography Using Noise Gate Software Logic Algorithm", Journal of Applied Sciences, Vol.10, Issue 1, ISSN:

-5654, 2010, P.P 59-64

A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O. Khalifa, “Novel Approach of Hidden Data in the (Unused Area 2 within EXE File) Using Computation Between Cryptography and Steganography ”, International Journal of Computer Science and

Network Security (IJCSNS) , Vol.9, No.5 , ISSN : 1738-7906, pp. 294-300.

Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan .T. Madhloom, B.B Zaidan, A.A Zaidan,” Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis”, A.A.Zaidan, Fazidah. Othman, B.B.Zaidan, R.Z.Raji,

Ahmed.K.Hasan, and A.W.Naji," Securing Cover-File without Limitation of Hidden Data Size Using Computation between Cryptography and Steganography ", World Congress on Engineering 2009 (WCE), The 2009 International Conference of Computer Science and Engineering, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009, ISBN: 978-988-17012-5-1, Vol.I, p.p259-265.

A.A.Zaidan, A.W. Naji, Shihab A. Hameed, Fazidah Othman and B.B.Zaidan, " Approved Undetectable-Antivirus Steganography for Multimedia Information in PEFile ",International Conference on IACSIT Spring Conference (IACSIT-SC09) , Advanced Management Science (AMS), Listed in IEEE Xplore and be indexed by both EI (Compendex) and ISI Thomson (ISTP), Session 9, P.P 425-429.

A.A.Zaidan, B.B.Zaidan, M.M.Abdulrazzaq, R.Z.Raji, and S.M.Mohammed," Implementation Stage for High Securing Cover- File of Hidden Data Using Computation Between Cryptography and Steganography", International Conference on Computer

Engineering and Applications (ICCEA09), Telecom Technology and Applications(TTA), indexing by Nielsen, Thomson ISI (ISTP), IACSIT Database, British Library and EI Compendex, Vol.19, Session 6, p.p 482-489.

A.W. Naji, A.A.Zaidan, B.B.Zaidan, Ibrahim A.S.Muhamadi, “New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Distortion Techniques”, Proceeding of World Academy of Science Engineering and Technology (WASET),Vol.56, ISSN:2070-3724, P.P 493-497.

J. Fridrich, Multimedia Security Technologies for Digital Rights Management. Academic Press, 2006, ch. Steganalysis, pp.349–381.J. Fridrich, R. Du, and M. Long, “Steganalysis of LSB encoding in color images,” in Proceedings of the IEEE International

Conference on Multimedia and Expo. New York, USA: IEEE Computer Society Press, 2000.

Amanpreet Kaur1, Renu Dhir2, and Geeta Sikka3 .A New Image Steganography Based On First Component Alteration Technique((IJCSIS) International Journal of Computer

Science and Information Security, Vol. 6, No. 3, 2009)

J. Fridrich, R. Du, and L. Meng,“Steganalysis of LSB Encoding in Color Images,” Proc. IEEE Int’l Conf.Multimedia and Expo, CD-ROM, IEEE Press,Piscataway, N.J., 2000.

Finlayson, G. D., Qiu, G., Qiu, M.,Contrast Maximizing and Brightness Preserving Color to Grayscale Image Conversion, 1999.

Tarun Kumar, Karun Verma,” A Theory Based on Conversion of RGB image to Gray image”, International Journal of Computer Applications Volume 7– No.2, September 2010.

Arvind Kumar, Km. Pooja, “Steganography-A Data Hiding Technique” International Journal of Computer Applications ISSN 0975– 8887, Volume 9– No.7, November 2010.

Additional Files

Published

15-04-2016

How to Cite

BOBBY .S. (2016). FUNDAMENTALS FOR STEGANOGRPHY USING LEAST SIGNIFICANT BIT ALGORITHM. International Education and Research Journal (IERJ), 2(4). Retrieved from https://ierj.in/journal/index.php/ierj/article/view/244