Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

LSB based Steganography Techniques for Secured Communication

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Sahil Kaushal, Ajay Kakkar
10.5120/ijca2018917651

Sahil Kaushal and Ajay Kakkar. LSB based Steganography Techniques for Secured Communication. International Journal of Computer Applications 181(10):28-31, August 2018. BibTeX

@article{10.5120/ijca2018917651,
	author = {Sahil Kaushal and Ajay Kakkar},
	title = {LSB based Steganography Techniques for Secured Communication},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2018},
	volume = {181},
	number = {10},
	month = {Aug},
	year = {2018},
	issn = {0975-8887},
	pages = {28-31},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume181/number10/29810-2018917651},
	doi = {10.5120/ijca2018917651},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Steganography is a data hiding technique which is used to prevent the data or any relevant information from falling to the hands of an unauthorized personal. So, in order to prevent such scenario the steganographic method is used using LSB matching technique in which the LSB of the pixels of the cover media is replaced with that of the relevant information and the cover media is chosen based on characteristics known to only the sender and receiver and no one else can access it. The steganographic technique can find its relevance and scope in merely many field like Marketing, MNC's, Industry. The literature review has been done by keeping in mind to obtain ideas and techniques to detect and improve as much as possible to the steganographic techniques and through research and work done on MATLAB software, were able to detect LSB based steganographic encrypted image from the others. To this some remarks were added to improve the security and evident in result section.

References

  1. M. Boroumand and J. Fridrich, (2018) "Applications of Explicit Non-Linear Feature Maps in Steganalysis,"  IEEE Transactions on Information Forensics and Security, vol. 13, no. 4, pp. 823-833.
  2. B. Li, Z. Li, S. Zhou, S. Tan and X. Zhang, (2018) "New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator," IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1242-1257.
  3. Y. T. Lin, C. M. Wang, W. S. Chen, F. P. Lin and W. Lin, (2018)"A Novel Data Hiding Algorithm for High Dynamic Range Images,"  IEEE Transactions on Multimedia, vol. 19, no. 1, pp. 196-211.
  4. J. Zeng, S. Tan, B. Li and J. Huang, (2018)"Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework,"  IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1200-1214.
  5. Abuadbba and I. Khalil, (2017) "Walsh–Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care,"  IEEE Transactions on Biomedical Engineering, vol. 64, no. 9, pp. 2186-2195.
  6. J. Camenisch, A. Lehmann, G. Neven and K. Samelin, (2017) "UC-Secure Non-interactive Public-Key Encryption," IEEE 30th Computer Security Foundations Symposium (CSF), Santa Barbara, CA, pp. 217-233.
  7. T. Denemark and J. Fridrich, (2017) "Steganography With Multiple JPEG Images of the Same Scene,"  IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2308-2319.
  8. K. Huang and R. Tso, (2017) "Provable secure dual-server public key encryption with keyword search,"IEEE 2nd International Verification and Security Workshop (IVSW), Thessaloniki, pp. 39-44.
  9. Q. Kong, R. Lu, S. Chen and H. Zhu, (2017) "Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 29-39.
  10. M. Ma, D. He, N. Kumar, K. K. R. Choo and J. Chen, (2017) "Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things," IEEE Transactions on Industrial Informatics, vol. no. 99, pp. 1-1.

Keywords

Steganography, Communication