CFP last date
20 May 2024
Reseach Article

Article:Evaluation of Various LSB based Methods of Image Steganography on GIF File Format

by Namita Tiwari, Dr.Madhu Shandilya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 2
Year of Publication: 2010
Authors: Namita Tiwari, Dr.Madhu Shandilya
10.5120/1057-1378

Namita Tiwari, Dr.Madhu Shandilya . Article:Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications. 6, 2 ( September 2010), 1-4. DOI=10.5120/1057-1378

@article{ 10.5120/1057-1378,
author = { Namita Tiwari, Dr.Madhu Shandilya },
title = { Article:Evaluation of Various LSB based Methods of Image Steganography on GIF File Format },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 2 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number2/1057-1378/ },
doi = { 10.5120/1057-1378 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:19.202133+05:30
%A Namita Tiwari
%A Dr.Madhu Shandilya
%T Article:Evaluation of Various LSB based Methods of Image Steganography on GIF File Format
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 2
%P 1-4
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. There have been many steganographic techniques available for hiding message in image having its own strength and weaknesses. Steganography can be carried out on any digital media. The chosen media for this system are GIF images. It is chosen due to wide use in web pages. In this paper we look at all the available image based steganography along with the cryptography technique to achieve security. This paper will focus on hiding the message in the least significant bits of the colors of the pixels of a GIF image. We discuss results obtained from evaluating available steganographic techniques and compare the different methods according to the vulnerability. In this paper we also discuss some application of steganography in network security

References
  1. Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon” Image Steganography: Concepts and Practice” WSPC/Lecture Notes Series: 9in x 6in, Institute of mathematical sciences,Singapore April 22,2004
  2. Neil F Johnson&Sushil jajodia,“Exploring Steganography: Seeing the Unseen” IEEE computer,february 1998 pp26-34
  3. Lisa M. Marvel,“Image Steganography for Hidden Communication”Final rept.jan1997-may1999 2000.
  4. R. Chandramouli, Nasir Memon, “Analysis of LSB Based Image Steganography Techniques” Proc. IEEE ICIP pp1019-1022, 2001.
  5. Li Zhi,Sui Ai Fen, “Detection of Random LSB Image Steganography”IEEE pp2113-2117,2004
  6. Mehdi Kharrazi,Husrev T. Sencar,Nasir Memon”Performance study of common image steganography and steganalysis techniques” Journal of Electronic Imaging vol.15(4), pp 041104,Oct–Dec 2006
  7. Hedieh Sajedi, Mansour Jamzad” Cover Selection Steganography Method Based on Similarity of Image Blocks”IEEE 8th International Conference on Computer and Information Technology Workshops pp379-384,2008
  8. Ismail Avcıbas, Mehdi Kharrazi, NasirMemon, Bulent Sankur”Steganalysis with Binary Similarity Measures” EURASIP Journal on Applied Signal Processing 2005:17, 2749–2757,2005
  9. T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically)
  10. Sanjeev Manchanda, Mayank Dave and S. B. Singh,” Customized and Secure Image Steganography Through Random Numbers Logic” Signal Processing: An International Journal, Volume 1 : Issue (1)2007
  11. Yanming Di, Huan Liu, Avinash Ramineni, and Arunabha Sen,” Detecting Hidden Information in Images:A Comparative Study”, Department of Computer Science and Engineering Arizona State University, Tempe, AZ 85287,2005.
  12. Bret Dunbar,” A detailed look at SteganographicTechniques and their usein an Open-SystemsEnvironment”, As part of the Information Security Reading Room, SANS Institute 2002.
  13. J.Fridrich,M.Goljan and R.Du,”Reliable detection of LSB steganography in color and grayscale images”proc. ACM workshop multimedia security ,Ottava,ON Canada ,Oct 5,2001,pp27-30.
  14. K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K. Murali” Chaos Based Spread Spectrum Image Steganography” IEEE Transactions on Consumer Electronics, Vol. 50, No. 2,pp 587-590 MAY 2004
  15. Xiangwei Kong,Ziren Wang,Xingang You, “Steganalysis of palette images:Attack Optimal Parity Assignment Algorithm”
  16. Rafael Gonzalez & Richard woods, “Digital Image processing” prentice HALL 2002
  17. Kurak C., J. McHugh, “A Cautionary Note on Image Downgrading”, IEEE Eight Annual computer security.Applications Conference, pp. 153-159, 1992.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography LSB GIF image