Image Steganography Approach using Spatial and Transform Domain Technique

Radhe Shyam Panda*, Deepika Gupta**, Madhuri Jaiswal***, Vaishnavi Kasar****, A. L. Prasanna*****
*-***** Department of Computer Science and Engineering, Shri Shankaracharya Technical Campus, Bhilai, Durg, Chhattisgarh, India.
Periodicity:March - May'2022
DOI : https://doi.org/10.26634/jcom.10.1.18504

Abstract

Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of information security. Steganography refers to the technique of hiding information in digital media to hide the existence of information. Data caching is the art of hiding data for colorful purposes similar as; to maintain private data, secure non-public data and so on. Securely exchange the data over the internet network is veritably important issue. So, to transfer the data securely to the destination, there are numerous approaches like cryptography and steganography. In this design we propose a LSB & DCT grounded steganographic system for hiding the data by applying Least Significant Bit (LSB) algorithm for bedding the data into the images which is enforced through the HTML, CSS, JavaScript.

Keywords

Image Steganography, LSB, CSS, HTML, Javascript.

How to Cite this Article?

Panda, R. S., Gupta, D., Jaiswal, M., Kasar, V., and Prasanna, A. L. (2022). Image Steganography Approach using Spatial and Transform Domain Technique. i-manager’s Journal on Computer Science, 10(1), 21-26. https://doi.org/10.26634/jcom.10.1.18504

References

[1]. Al-Ani, Z. K., Zaidan, A. A., Zaidan, B. B., & Alanazi, H. (2010). Overview: Main fundamentals for steganography. Journal of Computing, 2(3), 158-165. https://doi.org/10.48550/arXiv.1003.4086
[2]. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187.
[3]. Ibrahim, R., & Kuan, T. S. (2010). Steganography imaging system (SIS): hiding secret message inside an image. In Proceedings of the World Congress on Engineering and Computer Science, 1, 20-22.
[4]. Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142-172.
[5]. Odeh, A., Elleithy, K., Faezipour, M., & Abdelfattah, E. (2015). Novel steganography over HTML code. In Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering, 313, 607-611. https://doi.org/10.1007/978-3-319-06773-5_81
[6]. Por, L. Y., Lai, W. K., Alireza, Z., Ang, T. F., Su, M. T., & Delina, B. (2008). StegCure: A comprehensive steganographic tool using enhanced LSB scheme. WSEAS Transactions on Computers, 7(8), 1309-1318.
[7]. Singh, A. K., Singh, J., & Singh, H. V. (2015). Steganography in images using LSB technique. International Journal of Latest Trends in Engineering and Technology (IJLTET), 5(1), 426-430.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.