CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Dynamic Key based LSB Technique for Steganography

by Bhanupriya Katre, Bharti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 167 - Number 13
Year of Publication: 2017
Authors: Bhanupriya Katre, Bharti
10.5120/ijca2017914332

Bhanupriya Katre, Bharti . Dynamic Key based LSB Technique for Steganography. International Journal of Computer Applications. 167, 13 ( Jun 2017), 9-14. DOI=10.5120/ijca2017914332

@article{ 10.5120/ijca2017914332,
author = { Bhanupriya Katre, Bharti },
title = { Dynamic Key based LSB Technique for Steganography },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 167 },
number = { 13 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume167/number13/27829-2017914332/ },
doi = { 10.5120/ijca2017914332 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:14:43.943828+05:30
%A Bhanupriya Katre
%A Bharti
%T Dynamic Key based LSB Technique for Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 167
%N 13
%P 9-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography refers to the branch of computer science which deals with the covering up message in the format which cannot be detectable by any intruder. The secret message or the confidential data can be sent over internet with security using various steganography techniques. This technique has overcome many drawbacks of traditional method of cryptography in which data is encoded and sent over the internet which can be seen by the intruders and they can make attack on it. It is possible for the intruder to make the intrusion sometimes when the cryptographic algorithm is not sufficient enough but in case of steganography no one knows except the receiver that the message sent is confidential or hidden in some kind of picture, audio or video. So it makes it lot secure to send the message over internet with the use of steganography. In the proposed paper the detail information of image steganography is presented along with the applications and methods used for this process.

References
  1. G Prabakaran, R. Bhavani, P.S. Rajeswari, “Multi secure and robustness for medical image based steganography scheme” International Conference on Circuits, Power and Computing Technologies (ICCPCT), Publication Year: 2013 , Page(s): 1188 – 1193.
  2. N. Akhtar, ; P. Johri, ; S Khan, “Enhancing the Security and Quality of LSB Based Image Steganography” 5th International Conference on Computational Intelligence and Communication Networks (CICN), Publication Year: 2013 , Page(s): 385 – 390.
  3. R.P Kumar, V. Hemanth, M “Securing Information Using Sterganoraphy” International Conference on Circuits, Power and Computing Technologies (ICCPCT), Publication Year: 2013 , Page(s): 1197 – 1200.
  4. M.K Ramaiya. ; N.Hemrajani, A.K Saxena. “Security improvisation in image steganography using DES” IEEE 3rd International on Advance Computing Conference (IACC), Publication Year: 2013 , Page(s): 1094 – 1099.
  5. Rengarajan Amirtharajan\ Anushiadevi .R2, Meena .y2, Kalpana. y2 and John Bosco Balaguru “Seeable Visual But Not Sure of It” IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012.
  6. L.Jani Anbarasi and S.Kannan “Secured Secret Color Image Sharing With Steganography” IEEE 2012.
  7. G.Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” IEEE International Conference on Computing, Electronics and Electrical Technologies [ICCEET] 2012.
  8. Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar “An Image Steganography Technique using X-Box Mapping” IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012.
  9. RigDas and Themrichon Tuithung ”A Novel Steganography Method for Image Based on Huffman Encoding” IEEE 2012.
  10. Abhishek Gupta, Sandeep Mahapatra and, Karanveer Singh “ Data Hiding in Color Image Using Cryptography with Help of ASK Algorithm” 2011 IEEE.
  11. Navdeep and Ms Neha Goyal, "Hide Text in Images Using Steganography and a Review of Methods and Approach for Secure Stegnography", IJRIM Volume 6, Issue 5 (May, 2016) (ISSN 2231-4334), International Journal of Research in IT & Management (IMPACT FACTOR – 5.96).
  12. Dr. Rajkumar L Biradar and Ambika Umashetty, "A Survey Paper on Steganography Techniques", International Journal of Innovative Research in Computer and Communication Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 4, Issue 1, January 2016.
  13. Shikha Sharda and Sumit Budhiraja, "Image Steganography: A Review", International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013).
  14. Odai M. Al-Shatanawi and Nameer N. El. Emam, "A New Image Steganography Algorithm Based On Mlsb Method With Random Pixels Selection", International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015.
  15. Ashadeep Kaur, Rakesh Kumarand Kamaljeet Kaint, "Review Paper on Image Steganography", Volume 6, Issue 6, June 2016 International Journal of Advanced Research in Computer Science and Software Engineering.
  16. Divyanshu Triapthi, Yash Kumar Singh and Rohit Singh, "A Review on Digital Image Steganography with its Techniques and Model", IJSART – Volume 2 Issue 4–APRIL 2016 ISSN [ONLINE]: 2395-1052.
Index Terms

Computer Science
Information Sciences

Keywords

Stagnography Cover image Stego image LSB PSNR