Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
Published in | International Journal on Data Science and Technology (Volume 3, Issue 5) |
DOI | 10.11648/j.ijdst.20170305.11 |
Page(s) | 45-51 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Steganography, Algorithms, LSB, Depth of LSB, Distortion of Image
[1] | Manini Manasmita and Sangita Roy, “A Novel Approach to Format Based Text Steganography”, KIIT University, India, 2011, pp. 511. |
[2] | Very PDF Knowledge base website. [Online]. Available: http://www.verypdf.com/wordpress/201110/how-can-i-set-color-depth-and-resolution-settings-during-document-to-image-conversion-4898.html |
[3] | Neil F. Johnson and Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, George Mason University, 1998, pp. 26-30. |
[4] | Yale C/AIM Web Style Guide website “Color Display Primer”. [Online]. Available:http://vesta.astro.amu.edu.pl/Library/WWW/Tutorial1/graphics/display_primer.html |
[5] | Vijay Anand J. and Dharaneetharan G. D., “New Approach in Steganography by Integrating Different LSB Algorithms and Applying Randomization Concept to Enhance Security”, Kalasalingam University Srivilliputhur, Tamil Nadu, India, 1989, pp. 474-475. |
[6] | Samir Kumar Bandyopadhyay et al., “Genetic Algorithm Based Substitution Technique of Image Steganography”, University of Calcutta, Kolkata, India, 2011, pp. 63. |
[7] | Andreas Westfeld, “F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis” Institute for Sys. Arch., Germany, 2001, pp. 296-301. |
[8] | Surbhi Singhania et. al. “A study on time complexity of least significant bit steganography”, Proc. Nat. Conf. “Science in Media 2012”, University of Science and Technology, Faridabad, Haryana (India) Dec. 3rd-4th 2012, pp. 125-126. |
[9] | Namita Tiwari and Dr. Madhu Shandilya, “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format”, Int. Journal of Computer Applications, Vol. 6– No. 2, Sept. 2010, pp. 2. |
[10] | Ankit Gupta and Rahul Garg, “Detecting LSB Steganography in Images”, 2009, pp. 8-9. |
[11] | Lip Yee Por et al., “An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm”, The Int. Arab Journal of Info. Tech., Vol. 10, No. 1, Jan. 2013, University of Malaya, Malaysia, 2013, pp. 53. |
[12] | https://en.wikipedia.org/wiki/Steganography |
[13] | G. S. a. V. Kumar, “A novel technique for Reversible Information Hiding,” Advances in Computational Sciences and Technology (Research India Publications) ISSN 0973-6107, vol. 10, no. 7, pp. 2069-2078, Number 7 (2017). |
[14] | Vandana Yadav and Sanjay Kumar Sharma, “A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 2, 30 April 2017. |
[15] | V. I. *. P. L. T. Sivabalan A/L Patiburn, “Text Steganography using Daily Emotions Monitoring,” International Journal of Education and Management Engineering(IJEME), May 2017. |
[16] | V. S. a. J. Fridrich, “EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES,” in Image Processing (ICIP), 2016 IEEE International Conference, Phoenix, AZ, USA, 25-28 Sept. 2016. |
[17] | S. C. M. P. S. K. a. A. N. Pramod George Jose, “Hash and Salt based Steganographic Approach with Modified LSB Encoding,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 10599-10610, June 2016. |
[18] | Harjit Singh, "Analysis of Different Types of Steganography" International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 3, PP. 578-582, 06 June 2016. |
APA Style
Muhammad Zeeshan, Sibghat Ullah, Saadia Anayat, Rabia Ghulam Hussain, Nayab Nasir. (2017). A Review Study on Unique Way of Information Hiding: Steganography. International Journal on Data Science and Technology, 3(5), 45-51. https://doi.org/10.11648/j.ijdst.20170305.11
ACS Style
Muhammad Zeeshan; Sibghat Ullah; Saadia Anayat; Rabia Ghulam Hussain; Nayab Nasir. A Review Study on Unique Way of Information Hiding: Steganography. Int. J. Data Sci. Technol. 2017, 3(5), 45-51. doi: 10.11648/j.ijdst.20170305.11
AMA Style
Muhammad Zeeshan, Sibghat Ullah, Saadia Anayat, Rabia Ghulam Hussain, Nayab Nasir. A Review Study on Unique Way of Information Hiding: Steganography. Int J Data Sci Technol. 2017;3(5):45-51. doi: 10.11648/j.ijdst.20170305.11
@article{10.11648/j.ijdst.20170305.11, author = {Muhammad Zeeshan and Sibghat Ullah and Saadia Anayat and Rabia Ghulam Hussain and Nayab Nasir}, title = {A Review Study on Unique Way of Information Hiding: Steganography}, journal = {International Journal on Data Science and Technology}, volume = {3}, number = {5}, pages = {45-51}, doi = {10.11648/j.ijdst.20170305.11}, url = {https://doi.org/10.11648/j.ijdst.20170305.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijdst.20170305.11}, abstract = {Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.}, year = {2017} }
TY - JOUR T1 - A Review Study on Unique Way of Information Hiding: Steganography AU - Muhammad Zeeshan AU - Sibghat Ullah AU - Saadia Anayat AU - Rabia Ghulam Hussain AU - Nayab Nasir Y1 - 2017/09/26 PY - 2017 N1 - https://doi.org/10.11648/j.ijdst.20170305.11 DO - 10.11648/j.ijdst.20170305.11 T2 - International Journal on Data Science and Technology JF - International Journal on Data Science and Technology JO - International Journal on Data Science and Technology SP - 45 EP - 51 PB - Science Publishing Group SN - 2472-2235 UR - https://doi.org/10.11648/j.ijdst.20170305.11 AB - Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text. VL - 3 IS - 5 ER -