Image Steganography and Steganalysis Based on Least Significant Bit (LSB)

被引:8
|
作者
Rachael, Olomo [1 ]
Misra, Sanjay [1 ]
Ahuja, Ravin [2 ]
Adewumi, Adewole [1 ]
Ayeni, Foluso [3 ]
Mmaskeliunas, Rytis [4 ]
机构
[1] Covenant Univ, Otta, Nigeria
[2] Vishwakarma Skill Univ Gurugram, Gurugram, Hariyana, India
[3] Southern Univ, Baton Rouge, LA USA
[4] Kanus Univ Technol, Kaunas, Lithuania
关键词
Steganography; Image steganography; Information; Hiding; Security; Least significant bit; ALGORITHM;
D O I
10.1007/978-3-030-30577-2_97
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The sending of encrypted messages attracts the attention of programmers and crackers who would seek to intercept and uncover the messages before arrive their intended destination. Steganography is one way to mask communication by hiding unrevealed message inside another unsuspecting message. Steganography can be combined with cryptography in order to offer a satisfactory measure of privacy and security. In this study, a new approach of the least significant bit steganography has been proposed which improves on the 1 byte least significance technique. A detail description of image steganography procedures based on Least Significant Bit (LSB) to reduce the possibility of a message being recognized is provided. It includes steganalysis - the techniques by which secret information is been extracted.
引用
收藏
页码:1100 / 1111
页数:12
相关论文
共 50 条
  • [41] Undetectable least significant bit replacement steganography
    R. Shreelekshmi
    M. Wilscy
    C. E. Veni Madhavan
    [J]. Multimedia Tools and Applications, 2019, 78 : 10565 - 10582
  • [42] REDUCED COMPLEXITY ENHANCEMENT OF STEGANALYSIS OF LSB-MATCHING IMAGE STEGANOGRAPHY
    Malekmohamadi, Hossein
    Ghaemmaghami, Shahrokh
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 1013 - 1017
  • [43] Image steganalysis based on statistical moments of wavelet subband histogram of images with least significant bit planes
    Mehrabi, Mohammad Ali
    Aghaeinia, Hassan
    Abolghasemi, Mojtaba
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 768 - 772
  • [44] Steganalysis for LSB steganography based on statistical characteristic of adjacent pixels
    College of Computer and Communications, Hunan University, Changsha 410082, China
    不详
    [J]. Xitong Fangzhen Xuebao, 2007, 24 (5856-5860):
  • [45] RETRACTED: A stable image steganography: a novel approach based on modified RSA algorithm and 2-4 least significant bit (LSB) technique (Retracted Article)
    Kalaichelvi, V.
    Meenakshi, P.
    Vimala Devi, P.
    Manikandan, H.
    Venkateswari, P.
    Swaminathan, S.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (07) : 7235 - 7243
  • [46] MRF Based LSB Steganalysis: A New Measure of Steganography Capacity
    Mazumdar, Debasis
    Das, Apurba
    Pal, Sankar K.
    [J]. PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2009, 5909 : 420 - +
  • [47] Steganography Implementation on Android Smartphone Using the LSB (Least Significant Bit) to MP3 and WAV Audio
    Lindawati
    Siburian, Rita
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON WIRELESS AND TELEMATICS (ICWT), 2017, : 170 - 174
  • [48] Local Linear Transform and New Features of Histogram Characteristic Functions for Steganalysis of Least Significant Bit Matching Steganography
    Zheng, Ergong
    Ping, Xijian
    Zhang, Tao
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (04): : 840 - 855
  • [49] Research on Least Significant Bits (LSB) Image Information Hiding Based on Random Bit Selection Embedding Algorithm
    Dong, Wen
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING (ICIIP 2019), 2019, : 41 - 43
  • [50] Dual Image based LSB Steganography
    Maji, Giridhar
    Mandal, Sharmistha
    Sen, Soumya
    Debnath, Narayan C.
    [J]. PROCEEDINGS OF 2018 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SIGNAL PROCESSING, TELECOMMUNICATIONS & COMPUTING (SIGTELCOM 2018), 2018, : 61 - 66