28Mar 2018

IMAGE STEGANOGRAPHY USING IMPROVED LSB ALGORITHM.

  • B. Tech 4th year/CSE IMS Engineering college Ghaziabad, U.P., INDIA.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

The goal of Steganography is to hide communication. So, a fundamental requirement of this Steganography system is that the hidden message should not be visible to human beings. The other goal of this method is to avoid suspicion to the presence of hidden message. This technique has recently became important in a number of application areas. The project has various objectives such as: ? To produce security tool based on Steganography techniques ? To enhance techniques of hiding data using encryption. ? To extract hidden data using decryption methods. Steganography is sometimes used when encryption is not allowed. An encrypted file may still hide information using Steganography, so even if encrypted file is deciphered, the hidden message is not seen. The objective of ?Steganography? is to increase the efficiency of a system to reduce the manual labour.


  1. Atallah M. Al-Shatnawi " A New Method in Image Steganography with Improved Image Quality "Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 - 3915.
  2. Vivek Jain,Lokesh Kumar,Madhur Mohan Sharma,Mohd Sadiq and kshitiz Rastogi Volume 3,No.4,April 2012 " Public Key Steganogtraphy based on modified LSB method" Journal of Global Research in Computer Science.
  3. Silman,J.,"Steganography and Steganalysis: An Overview", SANS Institute,2001.
  4. Williams Stallings (2006) "Cryptography and Network Security Fourth edition"
  5. E., Shannon,(1949),Communication theory of secrecy systems, Bell System Technical Journal,28,656-715.
  6. Dunbar,B.,"Steganographic techniques and their use in an Open-Systems environment", SANS Institute, January 2002

[Rohit Chaudhary, Rishabh Kaushik and Tuariq Beg. (2018); IMAGE STEGANOGRAPHY USING IMPROVED LSB ALGORITHM. Int. J. of Adv. Res. 6 (Mar). 1161-1166] (ISSN 2320-5407). www.journalijar.com


Tuariq Beg
IMS Engineering College

DOI:


Article DOI: 10.21474/IJAR01/6779      
DOI URL: http://dx.doi.org/10.21474/IJAR01/6779