Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

New Image Steganography Method using Zero Order Hold Zooming

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Abdelmgeid A. A., Tarek A. A., Al-Hussien Seddik Saad, Shaimaa M. H.

Abdelmgeid A A., Tarek A A., Al-Hussien Seddik Saad and Shaimaa M H.. Article: New Image Steganography Method using Zero Order Hold Zooming. International Journal of Computer Applications 133(9):27-31, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Abdelmgeid A. A. and Tarek A. A. and Al-Hussien Seddik Saad and Shaimaa M. H.},
	title = {Article: New Image Steganography Method using Zero Order Hold Zooming},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {9},
	pages = {27-31},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


Steganography is a branch of information hiding. It allows the people to communicate secretly. Steganography word is classified into two parts: Steganos which means “secret or covered” (where you want to hide the secret messages) and the graphien which means “writing". It aims to embed secret data into a digital cover media, such as digital audio, image, video, etc., without being suspicious looking. In This paper a new image steganography method that hides the secret message inside the cover image using zero order hold (ZOH) is considered. The main goal of this method is to hide a secret message in the pixels of the cover image in such a way that the human eyes are not able to differentiate between the original and the stego-image.


  1. Bret D., "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment", Sans Institute, 1(2002).
  2. Akbas E. A., "A New Text Steganography Method By Using Non Printing Unicode Characters", Eng. & Tech. Journal, VOL.28, NO.1, 2010.
  4. Por L. Y., Delina B., "Information Hiding: A New Approach In Text Steganography" 7th WSEAS int. Conf. on Applied Computer & Applied Computational Science (ACACOS '08), Hangzhou, China, April 6-8, 2008
  5. Abdelmged A. A., Al-Hussien S. S., "Image Steganography Technique By Using Braille Method of Blind People (LSBraille) ", International Journal of Image Processing (IJIP), Vol 7, Issue 1, 2013.
  6. Chutani S., Goyal H. "LSB Embedding In Spatial Domain - A Review Of Improved Techniques". International Journal of Computers & Technology, ISSN: 2277-3061, 3(1),Aug. 2012.
  7. Atallah M. A. "A New Method In Image Steganography With Improved Image Quality". Applied Mathematical Sciences, 6(79), pp. 3907 – 3915, 2012.
  8. Aiad, I. A., "Hiding Data Using LSB - 3 ", J.Basrah Researches (Sciences), Vol. 33, No.4. (81-88), December, 2007.
  9. Ahmed A. R., Ahmed S. and Al-Hussien S. S., " A High Capacity SLDIP (Substitute Last Digit In Pixel ", Fifth International Conference on Intelligent Computing and Information Systems (ICICIS 2011), 30 June - 3 July, 2011, Cairo, Egypt.
  10. Johnson, Neil F., “Steganography”, 2000, URL: stegdoc/index2.html
  11. Jagvinder K. and Sanjeev K., "Study and Analysis of Various Image Steganography Techniques", IJCST Vol. 2, Issue 3, September 2011.
  12. Al-Hussien S. S., " Enhancing the (MSLDIP) Image steganographic method (ESLDIP Method) ", International Conference on Graphic and Image Processing (ICGIP 2011), Proc. of SPIE Vol. 8285, 82853I, © 2011 SPIE.
  13. Mohammed A. F., "Image Steganography by Mapping Pixels to Letters ", Journal of Computer Science, 5 (1) : 33-38, ISSN 1549-3636, 2009.
  14. Vipul S., Sunny K.,"A New Approach to Hide Text in Images Using Steganography ", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 3, Issue 4, April 2013.


Image Steganography, Peak Signal-to-Noise Ratio (PSNR), Maximum Hiding Capacity (MHC), Zero Order Hold (ZOH).