CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Enhanced Method for Least Significant Bit Image Steganography using Discrete Logarithmic Dispersion Strategy

by Sreeparna Ganguly, Pranati Rakshit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 10
Year of Publication: 2016
Authors: Sreeparna Ganguly, Pranati Rakshit
10.5120/ijca2016909943

Sreeparna Ganguly, Pranati Rakshit . An Enhanced Method for Least Significant Bit Image Steganography using Discrete Logarithmic Dispersion Strategy. International Journal of Computer Applications. 142, 10 ( May 2016), 23-27. DOI=10.5120/ijca2016909943

@article{ 10.5120/ijca2016909943,
author = { Sreeparna Ganguly, Pranati Rakshit },
title = { An Enhanced Method for Least Significant Bit Image Steganography using Discrete Logarithmic Dispersion Strategy },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 10 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number10/24933-2016909943/ },
doi = { 10.5120/ijca2016909943 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:37.840451+05:30
%A Sreeparna Ganguly
%A Pranati Rakshit
%T An Enhanced Method for Least Significant Bit Image Steganography using Discrete Logarithmic Dispersion Strategy
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 10
%P 23-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a novel method for information security using image steganography technique is proposed. This project simply hides a text message in an image file. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This work intends to give an overview of image steganography, its uses and techniques. The proposed method uses the LSB (Least Significant Bit) technique to hide information in the cover image. The system enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original image. Discrete logarithm calculation technique is used for determining the location of the bit into pixel to embed the message. The proposed algorithm provides a stego-key that will be used during the embedding and extracting of the message.

References
  1. Jassim Mohmmed Ahmed and Zulkarnain Md Ali, “Information Hiding using LSB technique” , IJCSNS International 18 Journal of Computer Science and Network Security, VOL.11 No.4, April 2011
  2. Shawn D. Dickman,”An Overview of Steganography”, Computer Forensics Term Paper, James Madison University
  3. M. M. Amin, et al., "Information hiding using steganography," in Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on, 2003, pp. 21-25.
  4. Debnath Bhattacharyya, Poulami Das,Samir Kumar Bandyopadhyay, and Tai-hoon Kim, “Text Steganography: A Novel Approach” International Journal of Advanced Science and TechnologyVol. 3, February, 2009.
  5. Richard Popa “An Analysis of Steganographic Techniques”.
  6. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen,Aleem Alvi “Pixel Indicator High Capacity Techniquefor Rgb Image Based Steganography”.
  7. C. Ming, et al., "Analysis of Current Steganography Tools: Classifications & Features," in Intelligent Information Hiding and Multimedia Signal Processing, 2006. IIH-MSP '06. International Conference on, 2006, pp. 384-387.
  8. F. A. P. Peticolas, et al., "Information hiding–a survey," Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999.
  9. Padmashree G, Venugopala P S ,“International Journal of Engineering and Innovative Technology (IJEIT)” .Volume 2, Issue 4, October Audio Stegnography and Cryptog raphy: Using LSB algorithm at 4th and 5thLSBlayers
  10. R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," Selected Areas in Communications, IEEE Journal on, vol. 16, pp. 474-481, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Information security Steganography Discrete logarithmic dispersion