Image Steganography and Steganalysis Based on Least Significant Bit (LSB)

被引:8
|
作者
Rachael, Olomo [1 ]
Misra, Sanjay [1 ]
Ahuja, Ravin [2 ]
Adewumi, Adewole [1 ]
Ayeni, Foluso [3 ]
Mmaskeliunas, Rytis [4 ]
机构
[1] Covenant Univ, Otta, Nigeria
[2] Vishwakarma Skill Univ Gurugram, Gurugram, Hariyana, India
[3] Southern Univ, Baton Rouge, LA USA
[4] Kanus Univ Technol, Kaunas, Lithuania
关键词
Steganography; Image steganography; Information; Hiding; Security; Least significant bit; ALGORITHM;
D O I
10.1007/978-3-030-30577-2_97
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The sending of encrypted messages attracts the attention of programmers and crackers who would seek to intercept and uncover the messages before arrive their intended destination. Steganography is one way to mask communication by hiding unrevealed message inside another unsuspecting message. Steganography can be combined with cryptography in order to offer a satisfactory measure of privacy and security. In this study, a new approach of the least significant bit steganography has been proposed which improves on the 1 byte least significance technique. A detail description of image steganography procedures based on Least Significant Bit (LSB) to reduce the possibility of a message being recognized is provided. It includes steganalysis - the techniques by which secret information is been extracted.
引用
收藏
页码:1100 / 1111
页数:12
相关论文
共 50 条
  • [1] Image complexity and feature mining for steganalysis of least significant bit matching steganography
    Liu, Qingzhong
    Sung, Andrew H.
    Ribeiro, Bernardete
    Wei, Mingzhen
    Chen, Zhongxue
    Xu, Jianyun
    [J]. INFORMATION SCIENCES, 2008, 178 (01) : 21 - 36
  • [3] Steganalysis of LSB-Matching Steganography by Removing Most Significant Bit planes
    Mehrabi, M. A.
    Aghaeinia, H.
    Abolghasemi, M.
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 731 - 734
  • [4] High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography
    Al-Afandy, Khalid A.
    El-Rabaie, El-Sayed
    Faragallah, Osama S.
    Elmhalawy, Ahmed
    El-Banby, Gh. M.
    [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 400 - 404
  • [5] Steganalysis of least significant bit matching based on image histogram and correlation
    Xia, Zhihua
    Wang, Shufang
    Sun, Xingming
    Wang, Baowei
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (03)
  • [6] An information theoretic image steganalysis for LSB steganography
    Chhikara, Sonam
    Kumar, Rajeev
    [J]. Acta Cybernetica, 2020, 24 (04): : 593 - 612
  • [7] An Information Theoretic Image Steganalysis for LSB Steganography
    Chhikara, Sonam
    Kumar, Rajeev
    [J]. ACTA CYBERNETICA, 2020, 24 (04): : 593 - 612
  • [8] Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique
    Alarood, Alaa Abdulsalm
    Alghamdi, Ahmed Mohammed
    Alzahrani, Ahmed Omar
    Alzahrani, Abdulrahman
    Alsolami, Eesa
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (07): : 427 - 442
  • [9] Image Steganography - Least Significant Bit with Multiple Progressions
    Goel, Savita
    Gupta, Shilpi
    Kaushik, Nisha
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 105 - 112
  • [10] Image-to-Image Steganography with Josephus Permutation and Least Significant Bit (LSB) 3-3-2 Embedding
    Yanuar, Muhammad Rafly
    Suryadi, M. T.
    Apriono, Catur
    Syawaludin, Muhammad Firdaus
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (16):