CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Block based Image Steganography using Entropy with LSB and 2-bit Identical Approach

by Manoj Kumar, Gursewak Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 8
Year of Publication: 2017
Authors: Manoj Kumar, Gursewak Singh
10.5120/ijca2017915146

Manoj Kumar, Gursewak Singh . Block based Image Steganography using Entropy with LSB and 2-bit Identical Approach. International Journal of Computer Applications. 171, 8 ( Aug 2017), 12-15. DOI=10.5120/ijca2017915146

@article{ 10.5120/ijca2017915146,
author = { Manoj Kumar, Gursewak Singh },
title = { Block based Image Steganography using Entropy with LSB and 2-bit Identical Approach },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 8 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number8/28200-2017915146/ },
doi = { 10.5120/ijca2017915146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:53.309656+05:30
%A Manoj Kumar
%A Gursewak Singh
%T Block based Image Steganography using Entropy with LSB and 2-bit Identical Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 8
%P 12-15
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography plays a very imperative role in secret communication. Many possible techniques are used to embed confidential information in digital images, the least significant bit (LSB) technique has very widely used. In this paper the proposed technique ,a new steganography technique is being developed to hide data in image using pixel based algorithm. Also, to make the algorithm more undetectable data is divided into segments and image into blocks and a data segment is embedded into an image block where it effects. The least image quality. The experimental results prove that the quality of stego image using the proposed algorithm. For the verification of the results, peak signal-to noise (PSNR) and mean square error (MSE) are calculated.

References
  1. A.singh, H.singh, “An Improved LSB based Image Steganography Technique for RGB Images,” international confrence IEEE, vol.978-1-4799-6085-9/15/$31.00 ©2015 IEEE.
  2. M.devi, N.sharma, “Improved detection of LSB SteganographyAlgorithms in Color and Gray Scale Images,” UIET Panjab University Chandigarh, vol. 978-1-4799-2291-8/14/$31.00 ©2014 IEEE.
  3. K.joshi, R.kumar, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication”, Third International Conference. Vol. 978-1-5090-0148-4/15/$31.00© 2015 IEEE .
  4. Shashikala Channalli, Ajay Jadhav , "Steganography An Art of Hiding Data", International Journal of Computer Science and Engineering.
  5. C.-K. Chan and L. Cheng, “Hiding data in images by simple {LSB}g substitution ,” Pattern Recognition, vol. 37, no. 3, pp. 469 – 474, 2004.
  6. X. Qing., X. Jianquan and X. Yunhua., “A High Capacity Information Hiding Algorithm in Color Image.”, Proceedings of 2nd International Conference on E-Business and Information System Security, IEEE Conference Publications, pp 1-4, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

LSB stego image secret image Arnold’s transformation identical bits