CFP last date
20 May 2024
Reseach Article

LSB based Steganography Techniques for Secured Communication

by Sahil Kaushal, Ajay Kakkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 10
Year of Publication: 2018
Authors: Sahil Kaushal, Ajay Kakkar
10.5120/ijca2018917651

Sahil Kaushal, Ajay Kakkar . LSB based Steganography Techniques for Secured Communication. International Journal of Computer Applications. 181, 10 ( Aug 2018), 28-31. DOI=10.5120/ijca2018917651

@article{ 10.5120/ijca2018917651,
author = { Sahil Kaushal, Ajay Kakkar },
title = { LSB based Steganography Techniques for Secured Communication },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 181 },
number = { 10 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number10/29810-2018917651/ },
doi = { 10.5120/ijca2018917651 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:36.148499+05:30
%A Sahil Kaushal
%A Ajay Kakkar
%T LSB based Steganography Techniques for Secured Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 10
%P 28-31
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a data hiding technique which is used to prevent the data or any relevant information from falling to the hands of an unauthorized personal. So, in order to prevent such scenario the steganographic method is used using LSB matching technique in which the LSB of the pixels of the cover media is replaced with that of the relevant information and the cover media is chosen based on characteristics known to only the sender and receiver and no one else can access it. The steganographic technique can find its relevance and scope in merely many field like Marketing, MNC's, Industry. The literature review has been done by keeping in mind to obtain ideas and techniques to detect and improve as much as possible to the steganographic techniques and through research and work done on MATLAB software, were able to detect LSB based steganographic encrypted image from the others. To this some remarks were added to improve the security and evident in result section.

References
  1. M. Boroumand and J. Fridrich, (2018) "Applications of Explicit Non-Linear Feature Maps in Steganalysis,"  IEEE Transactions on Information Forensics and Security, vol. 13, no. 4, pp. 823-833.
  2. B. Li, Z. Li, S. Zhou, S. Tan and X. Zhang, (2018) "New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator," IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1242-1257.
  3. Y. T. Lin, C. M. Wang, W. S. Chen, F. P. Lin and W. Lin, (2018)"A Novel Data Hiding Algorithm for High Dynamic Range Images,"  IEEE Transactions on Multimedia, vol. 19, no. 1, pp. 196-211.
  4. J. Zeng, S. Tan, B. Li and J. Huang, (2018)"Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework,"  IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1200-1214.
  5. Abuadbba and I. Khalil, (2017) "Walsh–Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care,"  IEEE Transactions on Biomedical Engineering, vol. 64, no. 9, pp. 2186-2195.
  6. J. Camenisch, A. Lehmann, G. Neven and K. Samelin, (2017) "UC-Secure Non-interactive Public-Key Encryption," IEEE 30th Computer Security Foundations Symposium (CSF), Santa Barbara, CA, pp. 217-233.
  7. T. Denemark and J. Fridrich, (2017) "Steganography With Multiple JPEG Images of the Same Scene,"  IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2308-2319.
  8. K. Huang and R. Tso, (2017) "Provable secure dual-server public key encryption with keyword search,"IEEE 2nd International Verification and Security Workshop (IVSW), Thessaloniki, pp. 39-44.
  9. Q. Kong, R. Lu, S. Chen and H. Zhu, (2017) "Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 29-39.
  10. M. Ma, D. He, N. Kumar, K. K. R. Choo and J. Chen, (2017) "Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things," IEEE Transactions on Industrial Informatics, vol. no. 99, pp. 1-1.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Communication