A Review on Steganography with LSB Algorithm

K. Jyothsna*, D. Ravi Teja**, S. Sai Lokesh Reddy***, G. Surya Kala Eswari****
*-**** Department of Computer Science and Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India.
Periodicity:September - November'2021
DOI : https://doi.org/10.26634/jcom.9.3.17199

Abstract

Steganography refers to the process of hiding information. The purpose of steganography is to hide information behind images. It means it encrypts the text within the image. Steganography gets completed when communication takes place between sender and receiver. Protection is the most important issue concerned with this. Steganography is used to secure information while it is being transmitted. Before the event of steganography, security is the most important concern for the researchers. Several techniques have been developed to ensure secure transmission. Steganography uses algorithms to hide information behind an image. The information is hidden character-wise behind the pixels of the image. The numerous algorithms or techniques used for steganography are LSB-Hash, RSA Encryption, and Decryption.

Keywords

Data Hiding, Audio, Video, Text, Image, Security, LSB, Encryption.

How to Cite this Article?

Jyothsna, K., Teja, D. R., Reddy, S. S. L., and Eswari, G. S. K. (2021). A Review on Steganography with LSB Algorithm. i-manager's Journal on Computer Science, 9(3), 23-28. https://doi.org/10.26634/jcom.9.3.17199

References

[1]. Abraham, A., & Paprzycki, M. (2004, April). Significance of steganography on data security. In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. (Vol. 2, pp. 347-351). IEEE. https://doi.org/10.1109/ITCC. 2004.1286660
[2]. Anderson, R. J., & Petitcolas, F. A. (1998). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474-481. https://doi.org/10.1109/ 49.668971
[3]. Gupta, S., Gujral, G., & Aggarwal, N. (2012). Enhanced least significant bit algorithm for image steganography. IJCEM International Journal of Computational Engineering & Management, 15(4), 40-42.
[4]. Hordri, N. F., Yuhaniz, S. S., & Shamsuddin, S. M. (2016). Deep learning and its applications: A review. In Conference on Postgraduate Annual Research on Informatics Seminar, (pp.1-6).
[5]. Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26- 34. https://doi.org/10.1109/MC.1998.4655281
[6]. Johnson, N. F., & Jajodia, S. (1998, April). Steganalysis of images created using current steganography software. In International Workshop on Information Hiding (pp. 273- 289). Springer, Berlin, Heidelberg. https://doi.org/10.1007/ 3-540-49380-8_19
[7]. Krenn, R. (2004). Steganography and steganalysis. Leiden Institute of Advanced Computing Science, (pp.1-9).
[8]. Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An overview of image steganography. In International Sports Sciences Association, 1(2), 1-11.
[9]. Shi, H., Zhang, X. Y., Wang, S., Fu, G., & Tang, J. (2019, June). Synchronized detection and recover y of steganographic messages with adversarial learning. In International Conference on Computational Science (pp. 31-43). Springer, Cham. https://doi.org/10.1007/978-3- 030-22741-8_3
[10]. Steganography. (n.d.). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Steganography
[11]. Wang, H., & Wang, S. (2004). Cyber warfare: steganography vs. steganalysis. Communications of the ACM, 47(10), 76-82. https://doi.org/10.1145/1022594.102 2597
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.