CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Implementation of LSB Steganography with 12-bit Frame Format

Published on March 2014 by Aishvary Goel, Anubhav Srivastava, Alok Kr. Mishra, Ayush Agarwal, Amit Kr. Gautam
International Conference on Advances in Computer Engineering and Applications
Foundation of Computer Science USA
ICACEA - Number 5
March 2014
Authors: Aishvary Goel, Anubhav Srivastava, Alok Kr. Mishra, Ayush Agarwal, Amit Kr. Gautam
28c81f3f-e396-46a4-a819-63ec0572a0f8

Aishvary Goel, Anubhav Srivastava, Alok Kr. Mishra, Ayush Agarwal, Amit Kr. Gautam . Implementation of LSB Steganography with 12-bit Frame Format. International Conference on Advances in Computer Engineering and Applications. ICACEA, 5 (March 2014), 9-12.

@article{
author = { Aishvary Goel, Anubhav Srivastava, Alok Kr. Mishra, Ayush Agarwal, Amit Kr. Gautam },
title = { Implementation of LSB Steganography with 12-bit Frame Format },
journal = { International Conference on Advances in Computer Engineering and Applications },
issue_date = { March 2014 },
volume = { ICACEA },
number = { 5 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/icacea/number5/15640-1451/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Engineering and Applications
%A Aishvary Goel
%A Anubhav Srivastava
%A Alok Kr. Mishra
%A Ayush Agarwal
%A Amit Kr. Gautam
%T Implementation of LSB Steganography with 12-bit Frame Format
%J International Conference on Advances in Computer Engineering and Applications
%@ 0975-8887
%V ICACEA
%N 5
%P 9-12
%D 2014
%I International Journal of Computer Applications
Abstract

The proposed system is an approach used to embed text into image. It enables the user to provide the system with both text and cover, and obtain a resulting image that contains the hidden text inside. The system uses the least significant Bit (LSB) method to embed the secret text in image after encrypt the secret text using a proposed method and store the text in image. The proposed system aims to provide improved robustness, security due to multi-level security architecture along with faster embedding and extraction process irrespective of size of embedded text.

References
  1. N. Johnson and S. Jajodia. Exploring Steganography: Seeing the Unseen. Computer, vol. 31, no. 2, pp. 2634, 1998.
  2. C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8 Annual Computer Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153-159.
  3. S. B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23, 2004, pp. 417-418.
  4. W. Huaiqing and S. Wang. Cyber warfare:Steganography vs. steganalysis. Communi-cations of the ACM, 47(10):76–82, 2004.
  5. Cryptography and Network , William Stallings , Prentice Hall of India
  6. J. C. Judge, Steganography: Past, present, future. SANS Institute publication.
  7. Km. Pooja ,Arvind Kumar , "Steganography- A Data Hiding Technique" International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No. 7, November 2010.
  8. Johnson, Neil F. , Duric, Zoron Jajodio, "Information Hiding Steganography and Watermarking –Attack and Countermesures", Kluwer Acdemic Publishers, 2001.
  9. Benjamin B. , Santiago G. , and victor B. , "Steganographic Watermarking for Documents", proceeding on the 34th Hawaii International conference on system science, 2001.
  10. Gruhl , D. , Bender W. , "Information Hiding to Foil the Casual Counterfaiter ",information hiding :second international workshop, proceeding Vol 1525, springger 1998.
  11. P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083-2126.
  12. R. Chandramouli, M. Kharrazi, N. Memon, "Image Steganography and Steganalysis: Concepts and Practice " , International Workshop on Digital Watermarking, Seoul, October 2004.
  13. R. J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications, 16(4), pp. 474-481.
  14. M. G. J. Fridrich. Practical steganalysis of digital images - state of the art. Security and Watermarking of Multimedia Contents IV, 4675:1–13, 2002.
  15. N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Workshop on Information Hiding, 1998.
  16. Mohammed S. ,"Text file hiding Techniques with Implemntation",M. Sc. thesis , National Computer Center,2001.
  17. Al-hamami, M. , "Information Hiding attack in Image" , M. Sc. thesis, Iraqi commission for computer &Informatics , Informatics Institute for Postgraduate Studies 2002.
  18. Zollenr J. , Fderrath H. , Klimant H. , Pfitzman A. , Piotraschke R. , "Modelling the Security of Steganography System", Information Hiding :Second International Workshop Proceeding VOL1525, PP244-354. 1998.
  19. A. D. Ker. A fusion of maximum likelihoodand structural steganalysis. In Proceedings of the 9th international conference on In-formation hiding, IH'07, pages 204–219, Berlin, Heidelberg, 2007. Springer-Verlag.
  20. A. Kerckhoffs. La Cryptographie Militaire (Military Cryptography). In J. Sciences Militaires (J. Military Science, in French), 1883.
  21. R. Krenn. Steganography and steganalysis. Whitepaper, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Lsb Technique Cryptography Encrypt Decrypt.