0% found this document useful (0 votes)
19 views9 pages

Image Steganography

Uploaded by

23pg1by0001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views9 pages

Image Steganography

Uploaded by

23pg1by0001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Securing Digital Images: A Comprehensive Survey

of Cryptographic-Steganographic Fusion Techniques


Aruna S
1
Department of Information Science and Engineering
BMS Institute Of Technology and Management
Bengaluru, India
arunaselvam30@bmsit.in

Abstract—Overview: This paper proposes a novel approach to holds immense significance due to its ability to facilitate confidential
enhancing data security in digital images by combining crypto- data exchange while maintaining a veil of secrecy.
graphic methods with steganography techniques. By encrypting By employing image steganography, individuals and organizations
data with established algorithms like AES or RSA before embed- can communicate sensitive information securely, shielding it from
ding it into cover images, this integration ensures confidentiality, unauthorized access and surveillance. This clandestine nature of
even if the stego image is accessed by unauthorized parties. Key steganography makes it invaluable in scenarios where heightened se-
management techniques further enhance security by controlling curity measures are essential, such as military operations, intelligence
access to concealed data. Through a comprehensive review, our gathering, and confidential business transactions. Its effectiveness lies
survey provides insights into the effectiveness of cryptographic- in its ability to conceal information in plain sight, allowing parties to
steganographic techniques, paving the way for future research communicate without arousing suspicion. Thus, image steganography
and innovation. emerges as a pivotal tool in safeguarding privacy and ensuring secure
Objective: This paper investigates the efficacy and applica- communication channels in an increasingly digital and interconnected
tions of cryptographic-steganographic techniques in enhancing world.
data security within digital images. It analyzes RSA and AES Cryptography, derived from the Greek words ”kryptos” (meaning
encryption algorithms, along with LSB and DST steganography hidden) and ”graphein” (meaning writing), encompasses a broad
techniques for data concealment. Additionally, the integration of spectrum of techniques aimed at securing communication channels.
AES encryption with LSB and DST steganography is explored, From ancient ciphers and codes to modern-day cryptographic algo-
emphasizing their advantages in data security and covert trans- rithms, the evolution of cryptography has been marked by a relentless
mission. pursuit of confidentiality, authenticity, and non-repudiation. Funda-
Findings: The paper examines RSA and AES encryption mental cryptographic primitives include symmetric-key encryption,
algorithms, demonstrating their effectiveness in safeguarding asymmetric-key encryption, and hash functions, each serving distinct
sensitive information. Additionally, LSB and DST steganography purposes in ensuring data security. The proliferation of digital tech-
techniques are discussed, highlighting their strengths and weak- nology has propelled cryptography to the forefront of cybersecurity,
nesses. Furthermore, the fusion of AES encryption with LSB and where it plays a pivotal role in safeguarding sensitive information
DST steganography is explored, illustrating how this combination across diverse domains.
enhances data security and covert transmission capabilities.
Results: The proposed approach provides a robust means of
safeguarding sensitive information while maintaining its confi- Fig. 1. Cryptography Process
dentiality and integrity. It has promising implications across
various domains, including secure communication, copyright
protection, and clandestine data transmission.
Keywords— Advanced Encryption Standard (AES), Asymmetric Fig. 2. Steganography Process
Encryption, Cryptography, Data Hiding in Space and Time (DST)
Steganography, LSB (Least Significant Bit) Steganography, Rivest, .
Shamir, Adleman (RSA), Steganography, Symmetric Encryption Steganography finds its roots in ancient civilizations, where methods
like invisible ink and microdots were utilized for secretive commu-
I. I NTRODUCTION nication. However, the digital age has brought about a significant
transformation in steganographic techniques. A landmark develop-
Image steganography, an ancient practice of embedding concealed ment was the introduction of Least Significant Bit (LSB) embedding,
information within images, has experienced a resurgence in the digital which revolutionized the concealment of data within image files.
era, emerging as a pivotal tool for secure communication. This This breakthrough laid the groundwork for further advancements
paper embarks on an exploration of recent advancements in image in spatial domain techniques, greatly expanding the capacity for
steganography, delineating both traditional techniques and cutting- covert data transmission within images. These innovations signify
edge innovations that are reshaping the landscape of clandestine data steganography’s adaptation to the digital landscape, leveraging evolv-
transmission. Steganography, rooted in the Greek words ”steganos” ing technologies to enhance the concealment of information. Today,
(concealed) and ”graphia” (writing), is an ancient practice of hiding steganography remains an essential tool in covert communication,
information within seemingly innocuous carriers to avoid detection. employing sophisticated algorithms and techniques to ensure data
In the digital realm, particularly within the domain of images, secrecy in the digital realm.
steganography involves embedding data discreetly into the visual Amidst the expanding interest in image steganography, there exists
content, thus creating covert communication channels. This technique a pressing need to scrutinize and contextualize recent advancements
in the field. This review is motivated by a desire to comprehensively it into the image, cryptographic-steganographic techniques provide
assess the dynamic landscape of image steganography, elucidat- both confidentiality and stealth, making it more challenging for
ing the strengths, weaknesses, and emergent trends that underpin unauthorized parties to access or detect the hidden information.
contemporary practices. By synthesizing insights from traditional The development of cryptographic-steganographic techniques
methodologies and state-of-the-art innovations, this paper aims to holds significant promise for various applications, including secure
foster a nuanced understanding of image steganography’s capabilities communication, digital watermarking, and forensic analysis. Re-
and limitations, while advocating for responsible research practices search in this area is essential for advancing data security practices
to mitigate potential misuse. and addressing the evolving threats faced in the digital landscape.
A. Motivation II. L ITERATURE R EVIEW
Researching cryptographic-steganographic techniques to enhance In order to improve image steganography techniques, many meth-
data security in digital images is motivated by the need to better pro- ods are proposed like M. Srivastava, et al. explored two main
tect sensitive information online. With so much data being exchanged techniques: Least Significant Bit(LSB) embedding and R- Color
digitally, there’s a growing concern about keeping it safe from hackers Channel encoding using RSA algorithm to provide a more secure
and other threats. Traditional methods like encryption are good, but and efficient way of hiding information within images[1].
they can struggle with images. Plus, as technology advances, so do Hiding Information in Digital Images Using LSB Steganography
the ways hackers can attack. By finding new ways to hide and protect Technique, which delves into the application of Least Significant
data within images, we can make it harder for hackers to access it. Bit (LSB) steganography to conceal data within digital images. LSB
This research also has practical uses, like making communication steganography involves embedding secret information into the least
more secure or helping law enforcement analyze digital evidence. significant bit of each pixel in an image, aiming to minimize visual
Overall, the motivation is to create stronger and smarter ways to changes to the original image while hiding the data[2].The key
keep our information safe online. aspects of this technique includes its capacity, imperceptibility and
robustness. However its simplicity can make it vulnerable to advanced
B. Objective detection methods and there’s trade off between data capacity and
In the realm of cryptographic-steganographic techniques for en- image imperceptibility.
hancing data security within digital images. Firstly, it seeks to A. Manideep, C. N, et al. proposed a method to implement
assess the effectiveness of integrating cryptographic methods with the steganography and cryptography techniques together to create a
steganography techniques to bolster data security. Additionally, the robust security tool for hiding, the security tool encrypts the message
paper endeavors to conduct a detailed analysis of the RSA and AES data using the Advanced Encryption Standard(AES) and embeds the
encryption algorithms concerning their performance in concealing encrypted data within image using steganography methods as LSB[3].
data within digital images. Furthermore, it aims to evaluate the Subramanian et al. provides a comprehensive overview of recent
efficacy of commonly used steganography techniques such as Least advancements in image steganography, focusing on the application of
Significant Bit (LSB) and Distortion-Based Steganography (DST) in deep learning techniques.The study explores various methodologies
data concealment. Moreover, the paper explores potential approaches used in image steganography, including traditional methods, CNN-
for integrating AES encryption with LSB and DST steganography based approaches, and GAN-based methods[4].
techniques to enhance data security and covert transmission ca- Nadish Ayub and Arvind Selwal intoduces a novel method for
pabilities. Additionally, the investigation extends to exploring key concealing confidential information within images to enhance security
management techniques for controlling access to concealed data during communication by embedding data in the edge pixels of the
within digital images, thereby enhancing overall security. Moreover, carrier image using different edge detection filters in the Discrete Co-
the paper endeavors to provide valuable insights into the potential sine Transform(DCT) domain which shows promising results in terms
applications of cryptographic-steganographic techniques, such as of security, performance, and potential for future enhancements[5].
secure communication, copyright protection, and clandestine data Serdar Solak et al. mainly focused on methods to embed secret data
transmission. Finally, it aims to propose future research directions in digital images while maintaining imperceptibility and robustness
and innovations based on the findings and analysis presented herein. against attacks.The authors utilized Discrete Cosine Transform(DCT),
Discrete Wavelet Transform(DWT) and Discrete Fourier Trans-
C. Background form(DFT) for embedding secret data in the frequency domain[6].
In today’s digital age, the security of digital data, including images, Min-Allah et al. provided a detailed examination of quantum
is of paramount importance. With the widespread use of digital steganography techniques for embedding confidential data into carrier
communication channels, there’s a growing concern about protecting image using quantum computing schemes and discussing the superi-
sensitive information from unauthorized access and interception. ority of quantum steganography over classical methods[7].
Traditional methods of data security, such as encryption, play a Internet of things for enterprise systems of modern manufacturing,
crucial role in safeguarding digital information by converting it into researchers focused on the utilization of Internet of Things(IOT)
an unreadable format using complex algorithms. However, when in modern manufacturing systems.Ragab et al.[8] discuss how IoT
it comes to securing digital images, encryption alone may not be enables the connections of diverse devices and system facilitating
sufficient due to the unique challenges posed by image complexity data-driven decision making process.
and large file sizes. Hiding using Cryptography and Image/Audio Steganography
This is where steganography comes into play. Steganography presents a novel approach to enhancing data security through the
involves concealing data within other data in such a way that it integration of cryptography and steganography techniques. The au-
remains undetectable to unintended recipients. While steganography thors Paniker et al.[9] developed a system that combines cryptography
provides a means of covertly transmitting information, it does not and steganography to provide double protection for hidden data in
inherently provide encryption or ensure data confidentiality. image and audio files ensuring data confidentiality and privacy during
In response to the limitations of individual encryption and transmission.
steganography methods, researchers have begun exploring the integra- Tumma Srinivasarao et al.[10] introduces a novel approach that
tion of cryptographic and steganographic techniques. This approach, combines cryptography and steganography techniques to enhance
known as cryptographic-steganographic techniques, aims to combine information security.he study focuses on developing a secure com-
the strengths of encryption and steganography to enhance data secu- munication system for transmitting data over insecure channels. By
rity within digital images. By encrypting the data before embedding utilizing the play fair cipher method for encoding hidden textual
content and incorporating Discrete Cosine Transform (DCT) and tiality.K. Dhande and R. Channe proposes a secure and efficient
Logical Operation Exclusive OR (XOR) techniques for embedding encryption scheme using data hiding in encrypted images.The A-S
encrypted messages within images, the proposed system ensures a algorithm, utilizing symmetric stream cipher data hiding, is employed
high level of security and confidentiality. for this purpose. Users can utilize encryption keys and data hiding
Performance Analysis of The Last Significant Bit (LSB) Method keys to encrypt images and hide data within them[24].
in Steganography for Data Hiding in Image Data by Fadhlirrahman D. Naidu et al. proposed a method to securely embed data
Baso[11] focuses on evaluating the effectiveness of the LSB method into multimedia files such as images, videos, and audio using a
in steganography for concealing data within image files. The study combination of encryption and steganography techniques. The authors
investigates how the LSB method, known for its simplicity and emphasize the importance of ensuring the confidentiality of messages
capacity, can be utilized to hide messages securely within digital transmitted over the internet and highlight the challenges of securing
images. large amounts of data in the digital age[25].Implementation and Com-
Dagadita et al.[12] presents a in-depth exploration of conceal- parison of different Data Hiding Techniques[26] in Image Steganog-
ing data within digital images through Least Significant Bit(LSB) raphy” focuses on the implementation and comparison of three
technique. The study discusses various modern digital steganography commonly used image steganography techniques: LSB technique,
techniques and details the process of encoding data into cover images Pixel Value Differencing technique, and LSB Substitution based on
using LSB insertion. similarity of bit pairs emphasizing the significance of steganography
Saha et al.[13] provides a detailed exploration of steganogra- in protecting classified information and private conversations.
phy techniques used for hiding data in digital images. It covers J. Stephy and V. Subramaniyaswamy introduces the concept of
various aspects of steganography, including its historical origins, Reversible Data Hiding (RDH), which allows for the restoration of
the evolution of techniques from ancient times to modern digital the original cover image without any loss providing a comprehensive
applications, and the process of embedding secret data within cover analysis of different data hiding techniques and their significance
images. A Study of Data Hiding Using Cryptography and Steganog- in maintaining security requirements in various applications. Perfor-
raphy” by Priya Mathur and Amit Kumar Gupta[14] delves into mance of Cover Image Steganography for Hidden Information within
the techniques of cryptography and steganography for securing and Image File using Least Significant bit algorithm explores the use of
encrypting data.Improved File Security System Using Multiple Image steganography to conceal data within image files. The researchers
Steganography presents a novel approach to enhancing file security conducted experiments to determine the optimal file size for hiding
through multiple image steganography.A. G. Benedict[15] discusses data using the Least Significant bit algorithm[28].
the implementation of this approach using a Java Application and The pixel-based approach to Steganography offers a simple yet
emphasizes the importance of secure data retrieval from the cover effective method to maintain the characteristics of the image file while
images at the destination. securely hiding data within it. By leveraging the pixel composition
Dr. Raja Rajeswari N and Ms. Meenadshi M[16] focused on of images (typically consisting of red, green, and blue colors), the
the development of a steganography interface that conceals text- algorithm ensures the integrity and confidentiality of the hidden
based secret data within non-text files, such as images, audio, or information[29]. S. Sravani and R. Raniith explores the application of
video files and o enable clandestine communication by encoding and steganography, particularly the LSB algorithm, to conceal confidential
decoding data within image files using LSB (Least Significant Bit) data within images for secure transmission over the internet. This
steganography techniques. Secure File Sharing System using Image study he effectiveness of the steganography technique is assessed
Steganography and Cryptography Techniques presents a system that using metrics such as Mean Square Error (MSE) and Peak Signal to
integrates image steganography and cryptography to enhance the Noise Ratio (PSNR), highlighting its suitability for security-related
security of file sharing. The system encrypts sensitive data using tasks.
cryptography and hides it within an image using steganography This literature review underscores the breadth of techniques and
techniques[17]. innovations in image steganography, all aimed at bolstering data secu-
D. Wahono et al.[18] provides a novel steganographic technique for rity and confidentiality. Ranging from conventional LSB embedding
enhancing data security in spatial domain images proving to improve to state-of-the-art deep learning-based methods, each approach brings
the confidentiality of hidden information by utilizing adjacent pixels distinct strengths and complexities to the table. As technological
based difference expansion within digital images.Similarly,S. Bohra landscapes evolve, the fusion of cryptography and steganography
et al.[19] study gives a comprehensive review of modern steganog- stands out as a pivotal strategy, offering sturdy defenses for trans-
raphy techniques aiming to enhance the data security. mitting data securely. By comprehensively examining and assessing
A method for Image Steganography based on the NICE (Non- these methodologies, researchers can push the boundaries of the field,
linear Independent Component Estimation) model. The approach guaranteeing ongoing safeguarding of sensitive information amid the
involves redesigning and training the NICE model on an image digital age’s rapid expansion.
dataset to establish a bijective function mapping the dataset image
distribution to a simple data distribution[20].V. k. Sharma et al.[21]
proposed technique involves encrypting the secret image through III. P ROBLEM S TATEMENT
pixel scrambling operations such as circular shift and swapping, and
then embedding the scrambled image into the cover image. This Securing sensitive information exchanged through digital images
process is repeated for multiple rounds to enhance security. poses a significant challenge in today’s digital landscape. While
N. Menon and V. Vaithiyanathan presents a Triple Layer Data traditional encryption methods provide a level of security, their
Hiding Mechanism that combines cryptography and steganography effectiveness in safeguarding images remains uncertain due to the
to enhance data security. Cryptography ensures secure communica- unique characteristics of visual data. Additionally, the utilization of
tion, while steganography hides messages so that only the intended steganography techniques introduces complexities in maintaining data
recipients can detect them. By integrating these two techniques, the integrity and confidentiality within images. The integration of crypto-
proposed mechanism encrypts data at two levels before embedding graphic and steganographic methods shows promise but necessitates
it into an image[22]. Application of Steganography Imaging by AES a thorough examination of their efficacy, limitations, and practical
and Random Bit by A. Harika et al[23] explores the application of implications. Therefore, this research addresses the pressing need to
steganography imaging using Advanced Encryption Standard(AES) develop and assess robust cryptographic-steganographic techniques
and random bit techniques to conceal data within another medium tailored for enhancing data security within digital images, while also
to ensure secure data transfer maintaining integrity and confiden- exploring their diverse applications across various domains.
IV. P ROPOSED M ETHOD in computing power and mathematical algorithms.
The propsed approach explores the fusion of cryptographic meth-
ods with steganography as a means to enhance data security within 2) AES Algorithm (Symmetric Key Algorithm): The Ad-
digital images. This integration involves encrypting the payload vanced Encryption Standard (AES) is a symmetric encryption algo-
before embedding it into the cover image using established cryp- rithm used to secure sensitive data. It is a block cipher, meaning it
tographic algorithms like Advanced Encryption Standard(AES) or operates on fixed-size blocks of data, and it employs a substitution-
Rivest, Shamir, Adleman(RSA). Through such encryption, the confi- permutation network (SPN) structure.
dentiality of the hidden information is maintained, even if unautho-
rized parties gain access to the stego image. Moreover, employing key Key Expansion:
management techniques contributes to improve security by regulating The original AES algorithm supports key sizes of 128, 192, or 256
access to the concealed data. This amalgamation not only ensures bits. The key expansion algorithm expands the initial key into a key
the confidentiality and integrity of hidden information but also schedule containing a number of round keys, which are used in the
strengthens the system’s resistance against detection and extraction encryption and decryption processes.
attempts. By critically analyzing existing research in this area, our
survey aims to provide valuable insights into the efficacy and poten- Initial Round Key Addition:
tial applications of cryptographic-steganographic techniques, thereby The plaintext block is XORed with the first round key.
highlighting avenues for future research and innovation in the field.
Rounds:
The main encryption process consists of multiple rounds, the
Fig. 3. Flow Diagram of whole system number of which depends on the key size:
• For a 128-bit key, there are 10 rounds.
• For a 192-bit key, there are 12 rounds.
A. Cryptographic Techniques • For a 256-bit key, there are 14 rounds.
1) RSA Algorithm (Asymmetric Key Algorithm): RSA is Each round applies a series of transformations to the data block:
a widely used asymmetric encryption algorithm named after its
inventors Ron Rivest, Adi Shamir, and Leonard Adleman. It is based 1) SubBytes: Substitutes each byte of the state with a correspond-
on the difficulty of factoring large prime numbers. RSA encryption ing byte from a substitution box (S-box).
algorithm is a type of public-key encryption algorithm. Public Key 2) ShiftRows: Shifts the rows of the state matrix cyclically to the
encryption algorithm is also called the Asymmetric algorithm. Asym- left.
metric algorithms are those algorithms in which sender and receiver 3) MixColumns: Mixes the columns of the state matrix using a
use different keys for encryption and decryption. Each sender is fixed polynomial multiplication in a finite field.
assigned a pair of keys.The Public key is used for encryption, and the 4) AddRoundKey: XORs the state with the round key.
Private Key is used for decryption. Decryption cannot be done using After the final round, there is no MixColumns step.
a public key. The two keys are linked, but the private key cannot be
derived from the public key. The public key is well known, but the Final Round:
private key is secret and it is known only to the user who owns the In the final round, the SubBytes, ShiftRows, and MixColumns
key. It means that everybody can send a message to the user using steps are omitted, and only the AddRoundKey step is performed.
user’s public key. But only the user can decrypt the message using
his private key. Output:
Step to calculate RSA Algorithm The resulting ciphertext block is the encrypted form of the plain-
text.
Key Generation: Decryption in AES is essentially the same process as encryption
1) Choose two large prime numbers, p and q. but in reverse, using the inverse operations of the encryption steps
2) Compute their product, n = p × q. This is the modulus. and the round keys in reverse order.
3) Calculate Euler’s totient function, φ(n) = (p − 1) × (q − 1). The strength of AES lies in its resistance to various crypto-
4) Choose an integer e such that 1 < e < φ(n), and e is coprime graphic attacks, including brute-force attacks, differential and linear
with φ(n). This is the public exponent. cryptanalysis, and others. It is widely used in various applications,
5) Compute the modular multiplicative inverse of e modulo φ(n), including securing data transmission over networks, encrypting files
which gives us the private exponent d. This is the private key. and databases, and protecting sensitive information in storage and
communication.
Encryption:
1) To encrypt a message M , convert it into an integer m such B. Steganography Techniques
that 0 ≤ m < n. 1) Least Significant Bit (LSB) Steganography: LSB (Least
2) Compute the ciphertext C = me mod n. Significant Bit) steganography is a method employed to conceal
information within the least significant bit of digital data like images
Decryption: or audio files. The concept is to alter the least significant bit of
1) To decrypt the ciphertext C, compute the plaintext message each byte in the carrier file to encode the concealed information
M = C d mod n. without causing noticeable changes to the carrier file’s appearance or
The security of RSA relies on the difficulty of factoring the audio quality. This technique is widely used due to its simplicity and
modulus n into its prime factors, p and q. If an attacker could effectiveness in hiding data discreetly.In this technique, the bits of the
factorize n, they could compute φ(n) and obtain the private exponent image are replaced by the bits of the data to be embedded or hidden.
d from the public exponent e. However, for large enough primes, this The secret message can be inserted inside the image by altering only
factorization is computationally infeasible with current technology. the first rightmost bit of the image. While using this algorithm it
RSA is used for secure communication and digital signatures in should be noted that, when we apply this algorithm to each byte of
various cryptographic protocols and systems. However, it’s essential the 24-bit image, only three bits are capable to be embedded in each
to use sufficiently large key sizes to resist attacks based on advances pixel of the image.[9]
. TABLE I
Steps of Least Significant Bit(LSB) Algorithm. C OMPARISON OF AES AND RSA ALGORITHMS

Carrier Selection: Factor AES RSA


• Choose a suitable carrier file, such as an image, audio, or video Speed Fast Slow
file, which will hide the secret message. The file should be large Key size 128, 192, 256 bits 1024-8192 bits
enough to accommodate the hidden data without degrading its Block size 128 bits Minimum 512 bits
quality. Computational Low High
Cost
Message Encoding: Type Symmetric Asymmetric
• Convert the message or data you want to hide into binary format. algorithm algorithm
This could involve converting text characters to their ASCII Security Excellent secured Least secure
binary representation or encoding binary data directly. Key used Same key used Different key
Embedding Process: Best Uses File Encryption Digital Signatures
• For each byte of the carrier file: Wireless Network SSL/TSL handshakes
Ciphering and Different Same
1) Retrieve the pixel value (for images) or the sample value
deciphering
(for audio/video) from the carrier file. algorithm
2) Replace the least significant bit (LSB) of the pixel/sample
value with the corresponding bit from the message.
3) Repeat the process until all message bits have been
embedded. 2) Data Hiding in Space and Time (DST) Steganography:
Extraction Process: DST (Data Hiding in Space and Time) steganography is an advanced
method for concealing data within multimedia files, such as images,
• To extract the hidden message from the stego file:
audio, or videos. Unlike conventional steganography approaches that
1) Retrieve the LSBs of each byte in the stego file. solely modify the spatial domain, DST steganography leverages both
2) Concatenate the LSBs to reconstruct the binary message. spatial and temporal dimensions to hide data effectively.
3) Convert the binary message back into its original format This technique involves subtly manipulating both spatial and
(e.g., ASCII characters). temporal aspects of the multimedia content.The hidden message is
converted into a binary stream of “1” and “0” which is inserted
Algorithm for LSB Embedding: 117 into the DCT domain of the cover image. The color-based
. transformation converts 118 the image (cover image) into 8 × 8
1. Convert the message into binary format. blocks of pixels.[14].
2. Open the carrier image.
3. For each pixel in the image: Steps of Data Hiding in Space and Time(DST) Algorithm.
• Retrieve the RGB values (for color images) or grayscale value 1) Carrier Selection: Pick a multimedia file like an image, audio,
(for grayscale images). or video for hiding data.
2) Data Encoding: Convert the data to be hidden into a format
• Replace the least significant bit of each color channel or
suitable for embedding, like binary, and possibly compress it
grayscale value with the corresponding bit from the message.
to reduce its size.
• Repeat until all message bits are embedded or all pixels have 3) Spatial Domain Modification: Modify the carrier file by chang-
been processed. ing pixel values for images or samples for audio to embed the
4. Save the modified image as the stego image. encoded data.
5. Return the stego image. 4) Temporal Domain Modification: If using video or audio files,
spread the hidden data across multiple frames or segments to
Algorithm for LSB Extraction: increase its resilience against detection.
. 5) Encryption (Optional): Optionally encrypt the hidden data for
1. Open the stego image. security, ensuring that it remains unreadable without the correct
2. Initialize an empty list to store the LSBs of each pixel. decryption key.
3. For each pixel in the image: 6) Embedding Technique: Use a specific method to merge the
encoded data with the carrier file while minimizing noticeable
• Retrieve the LSB of each color channel or grayscale value.
changes.
• Append the LSBs to the list. 7) Quality Assessment (Optional): Evaluate the quality of the
4. Concatenate the LSBs to reconstruct the binary message. modified carrier file to ensure that the embedded data doesn’t
5. Convert the binary message back into its original format (e.g., significantly degrade its overall quality.
ASCII characters). 8) Extraction: When necessary, extract the hidden data from the
6. Return the extracted message. modified carrier file using a compatible extraction algorithm,
reversing the embedding process to retrieve the original en-
Through LSB (Least Significant Bit) steganography, data can be coded data.
hidden within the least significant bit of digital files like images .
or audio without causing noticeable changes in the carrier file’s DST (Data Hiding in Space and Time) steganography is a method-
appearance or sound quality. This technique operates by subtly ological advancement in concealing data within multimedia files. By
modifying the least significant bit of each byte in the carrier file to leveraging both spatial and temporal dimensions, DST techniques
encode the concealed information. LSB steganography finds utility bolster the security of hidden data, presenting formidable obstacles
across various domains, facilitating covert communication, copyright to detection. Although implementing DST may demand additional
protection, and data embedding. computational resources and expertise, its efficacy in safeguarding
sensitive information underscores its significance in diverse security
and privacy contexts. As research in steganography progresses, DST Upon receiving the stego medium, the intended recipient can
stands as a pioneering approach, offering novel strategies for ensuring extract the hidden ciphertext and decrypt it using the appropriate
secure data concealment amidst evolving digital landscapes. AES decryption key, thus retrieving the original plaintext message.
This integrated approach is invaluable for scenarios requiring both
C. Combining Cryptographic and Steganography confidentiality and covert transmission, such as military intelligence
or confidential corporate communications. However, it’s essential to
In the combined technique of steganography and cryptography,
implement this method carefully, considering potential vulnerabilities
the process begins by selecting a suitable cover medium, such as
and detection methods adversaries might employ.
an image, audio file, or video, that will camouflage the secret mes-
In summary, integrating AES encryption with LSB steganography
sage. Next, the message is encrypted using cryptographic algorithms
offers a potent means of securing and covertly transmitting sensitive
like AES or RSA, ensuring its confidentiality. Once encrypted, the
information. AES encryption safeguards data confidentiality, while
message is embedded into the cover medium using a steganographic
LSB steganography conceals encrypted data within seemingly
method like LSB insertion or spread spectrum. This embedding
innocuous cover media. This combined approach ensures that
process disguises the encrypted message within the carrier medium’s
information remains protected and hidden from unauthorized
data, making it imperceptible to human senses or statistical analysis.
access. Careful implementation is key to maintaining the integrity
After embedding, the modified cover medium containing the hid- of the hidden data and avoiding detection by adversaries. When
den message can be transmitted over a network or stored in a location executed effectively, this hybrid technique proves invaluable for
accessible to the intended recipient. Upon receiving the modified maintaining confidentiality and security in scenarios where discretion
medium, the recipient extracts the hidden data using steganographic is paramount.
extraction techniques. Finally, the recipient decrypts the extracted
message using the appropriate decryption key, revealing the original 2) AES Technique with DST: AES with DST steganography
plaintext content. combines two distinct methods to ensure secure communication and
By integrating steganography and cryptography, this technique covert data transmission. Firstly, AES (Advanced Encryption Stan-
offers an additional layer of security for sensitive information dard) is utilized to encrypt sensitive information, thereby guaranteeing
transmission. It not only hides the message but also encrypts it, its confidentiality. AES employs a symmetric encryption algorithm
making it doubly challenging for unauthorized parties to intercept with a specific secret key to transform plaintext into ciphertext,
or decipher the concealed information. making it indecipherable to unauthorized individuals.
Following encryption, DST (Data Space Transformation) steganog-
1) AES Technique with LSB: Combining AES encryption with raphy is applied. DST alters a cover medium, such as an image
LSB steganography creates a robust method for securing and covertly or audio file, in a manner that embeds the encrypted data without
transmitting sensitive information. AES encryption ensures that the noticeably changing its perceptual quality. This transformation creates
data remains confidential and integral during transmission, while LSB space within the cover medium to conceal the encrypted information
steganography provides a means of hiding the encrypted data within while preserving its outward appearance.
a seemingly innocuous cover medium. During the embedding process, the encrypted ciphertext is in-
To start, the plaintext message undergoes AES encryption, a tegrated into the modified cover medium using DST techniques,
process that converts it into ciphertext using a cryptographic key. This ensuring its covert presence. This results in a seemingly ordinary
ciphertext appears as random data to anyone without the decryption file that secretly carries encrypted data.
key. Next, the ciphertext is embedded into the least significant bits The modified cover medium, now containing the encrypted in-
(LSBs) of a chosen cover medium, like an image or audio file. LSBs formation, can be transmitted or stored without raising suspicions.
are ideal for hiding data because altering them minimally impacts the To access the concealed data, the recipient employs the appropriate
cover medium’s decryption key for AES. By decrypting the embedded ciphertext, the
original plaintext is retrieved, completing the secure communication
TABLE II process.
C OMPARISON OF LSB AND DST S TEGANOGRAPHY In essence, AES with DST steganography provides a robust ap-
proach for securely encrypting and transmitting sensitive information
Feature LSB DST within innocuous cover media, thus protecting it from unauthorized
access and detection.
Embedding Replace the least Modify pixel
Technique significant bit of values based on AES with DST steganography seamlessly merges encryption and
pixel values. distortion map. covert data embedding techniques to ensure secure communication
Robustness Less robust More robust and discreet information transmission. By leveraging the Advanced
against compression against compression Encryption Standard (AES) for encryption and Data Space Transfor-
and editing. and editing. mation (DST) for steganographic embedding, this method prioritizes
Security Lower security due to Higher Security the confidentiality of sensitive data while avoiding detection. AES
susceptibilty to due to selective encrypts plaintext into ciphertext, rendering it unreadable to unautho-
analysis. modification. rized parties, while DST conceals this encrypted data within a cover
Complexity Simple More Complex
medium, seamlessly integrating it without altering the medium’s
Implementation. Implementation.
appearance significantly. This process results in an innocuous-looking
file that clandestinely carries encrypted information. As a result, AES
with DST steganography offers a robust solution for safeguarding
appearance or quality, making the modifications imperceptible to sensitive data, facilitating secure transmission and storage without
human observers. drawing attention or compromising confidentiality.
The resulting stego medium appears unchanged to casual observers
but contains the encrypted information hidden within its LSBs. This V. P ERFORMANCE E VALUATION
blend of AES encryption and LSB steganography offers a powerful Combining cryptographic and steganographic techniques provides
combination of security and stealth. AES encryption provides robust a robust approach to securing sensitive information. In the AES with
protection against unauthorized access, while LSB steganography LSB Steganography method, the message is first encrypted using
facilitates covert communication without arousing suspicion. AES to guarantee confidentiality. This encrypted message is then
subtly embedded into the least significant bits of a chosen cover • Error Resistance: LSB steganography is less robust to noise or
medium, such as an image or audio file, ensuring that the alterations compression. If the image is compressed, the hidden data might
are imperceptible to human observers. On the other hand, AES be corrupted.
with DST Steganography integrates AES encryption with Data Space • Robustness Test: Compressing the image to JPEG format might
Transformation (DST) steganography. After encryption, the ciphertext lose the LSB changes, corrupting the hidden message.
is embedded into the cover medium using DST techniques, which 2) AES with DST Steganography:
modify the cover medium’s data space to conceal the encrypted
• Example: Covert messaging where images are shared on social
information while maintaining its outward appearance.These tech-
media, which often compresses images.
niques offer different levels of security and efficiency, making them
• Data Integrity: AES ensures data remains secure and intact.
suitable for various applications. Let’s examine their performance
• Integrity Test: An encrypted message ”Confidential meeting
across different criteria.
agenda” embedded in a high-quality JPEG image remains secure
even if the image undergoes slight edits.
A. Security • Error Resistance: DST steganography is more robust against
1) AES with LSB Steganography: common processing such as compression and resizing.
• Robustness Test: Compressing the image slightly does not
• Example: Secure communication in a company where employ- corrupt the hidden message, as DST embedding techniques are
ees need to send confidential reports via email. designed to withstand such modifications.
• Confidentiality: A confidential report is encrypted using AES.
The encrypted data (ciphertext) looks like random noise. C. Complexity and Computational Efficiency
• Encryption Process: A plaintext report ”Q1 financial results” is
encrypted with AES using a secret key, resulting in a ciphertext 1) AES with LSB Steganography:
that is not understandable without the key. • Example: Real-time secure communication in a chat application
• Stealth: The ciphertext is embedded into the least significant where speed is crucial.
bits (LSBs) of an image, such as a company logo. • Computational Complexity: AES is efficient and quick.
• Embedding Process: The encrypted report is embedded into the • Efficiency Test: Encrypting a short message ”Hello” with AES
LSBs of each pixel in the image. For example, an image pixel takes milliseconds.
with a binary value of 11010010 might have its LSB changed • Embedding and Extraction Efficiency: LSB embedding and
to 1 or 0 to embed part of the encrypted message, minimally extraction are computationally lightweight.
affecting the pixel’s color. • Efficiency Test: Embedding the encrypted ”Hello” in a profile
• Resistance to Statistical Attacks: The LSB method is some- picture is done in real-time without noticeable delay.
what vulnerable to statistical analysis, but since the hidden data 2) AES with DST Steganography:
is encrypted, even if detected, it remains secure.
• Security Test: An attacker might notice irregularities in the • Example: High-security communications in a governmental
image’s LSB pattern but cannot decrypt the message without agency where security outweighs processing time.
the AES key. • Computational Complexity: AES remains efficient, but DST
embedding is more complex.
2) AES with DST Steganography: • Efficiency Test: Encrypting a long document ”Top secret
• Example: Military intelligence where sensitive information dossier” with AES is quick, but embedding it using DST may
must be securely transmitted without raising suspicion. take longer due to the sophisticated embedding process.
• Confidentiality: A strategic military plan is encrypted using • Embedding and Extraction Efficiency: DST processes are
AES, turning the plaintext into ciphertext. more computationally intensive but provide higher security.
• Encryption Process: The plaintext ”Operation XYZ at 0400 • Efficiency Test: Embedding the ”Top secret dossier” into a
hours” is encrypted with AES, producing an indecipherable high-resolution image takes longer but ensures higher security
ciphertext. and robustness.
• Stealth: The ciphertext is embedded into an audio file of a
routine radio broadcast using DST steganography. D. Application Suitability
• Embedding Process: The DST technique modifies the audio 1) AES with LSB Steganography:
file’s data space to hide the encrypted message, making changes
imperceptible. This might involve altering audio samples in a • Example: Internal communication within a small business
way that doesn’t change the perceived sound quality. where simplicity and quick transmission are needed.
• Resistance to Detection: DST provides higher resistance to sta- • Use Cases: Suitable for embedding messages in images shared
tistical analysis and detection than LSB because the embedding over email without heavy processing.
process doesn’t create noticeable patterns. • Application Test: Embedding ”Project update” in an image
• Security Test: An attacker analyzing the audio file for anoma- attached to an email and sending it quickly.
lies would find it challenging to detect any hidden message due • Limitations: Not ideal for images that might be compressed or
to the sophisticated nature of DST modifications. extensively edited.
• Limitation Test: If the image is compressed by the email server,
the hidden message might be corrupted.
B. Robustness
2) AES with DST Steganography:
1) AES with LSB Steganography: • Example: Transmission of sensitive documents between diplo-
• Example: Covert messaging within an organization using image mats where security and robustness are critical.
files that might undergo basic editing. • Use Cases: Ideal for embedding data in media that might be
• Data Integrity: AES ensures the data remains intact during shared or stored in ways that involve compression or minor
transmission. editing.
• Integrity Test: The encrypted message ”Employee salaries” • Application Test: Embedding ”Diplomatic instructions” in a
embedded in a PNG image is not altered during transmission high-quality image that might be shared on secure servers and
over the internet. ensuring the hidden data survives typical image processing.
• Limitations: Higher computational requirements might not be potential vulnerabilities and detection methods that adversaries might
suitable for all scenarios. employ. With continued research and innovation, cryptographic-
• Limitation Test: Embedding and extracting data from an image steganographic approaches can play a vital role in safeguarding data
requires more processing power and time, which might be a privacy and security in diverse applications.
constraint in low-resource environments.
Hence the choice between AES with LSB steganography and VIII. F UTURE W ORK
AES with DST steganography depends on the specific needs of Future advancements in image steganography could involve inte-
the application. AES with LSB is efficient and suitable for less grating more advanced encryption techniques, exploring methods that
demanding environments, while AES with DST offers higher security can resist deep learning-based steganalysis, and expanding steganog-
and robustness for high-stakes scenarios. Examples illustrate that raphy to multimedia beyond images. Dynamic payload adaptation
each method has distinct advantages and limitations, emphasizing and thorough security analysis under various threat scenarios are also
the importance of selecting the appropriate technique based on the critical areas for future exploration. Additionally, exploring privacy-
security requirements and the expected processing conditions. preserving applications and establishing standardized evaluation met-
rics could further advance the field.
VI. R ESULTS A ND D ISCUSSION
The fusion of cryptographic methods with steganography presents R EFERENCES
a sophisticated strategy to bolster data security within digital images.
[1] M. Srivastava, P. Dixit and S. Srivastava, ”Data Hiding using Image
By intertwining robust encryption techniques like RSA and AES with
Steganography,” 2023 6th International Conference on Information Sys-
covert data embedding methods such as LSB and DST steganography, tems and Computer Networks (ISCON), Mathura, India, 2023, pp. 1-6,
the system aims to fortify the confidentiality and integrity of hidden doi: 10.1109/ISCON57294.2023.10112069.
information. [2] Abdulazeez, Sabah & Nawar, Abbas & Lubna, Emad. (2023). Hiding
The integration begins with the selection of a suitable cover Information in Digital Images Using LSB Steganography Technique.
medium, be it an image, audio file, or video, which serves as International Journal of Interactive Mobile Technologies (iJIM). 17. 167-
the carrier for the concealed message. This message undergoes 178. 10.3991/ijim.v17i07.38737.
encryption using established cryptographic algorithms like RSA or [3] A. Manideep, C. N. V. Reddy, B. Srujana, and S. S. H. Raju, “Informa-
AES, ensuring its confidentiality even if unauthorized parties gain tion Hiding Secretly Using Image Steganography”, IJRESM, vol. 6, no.
1, pp. 17–20, Jan. 2023, Accessed: May 12, 2024.
access to the stego image.
[4] Subramanian, Nandhini & Elharrouss, Omar & Al-ma’adeed, Somaya &
The RSA algorithm, known for its asymmetric encryption capa- Bouridane, Ahmed. (2021). Image Steganography: A Review of the Re-
bilities, generates pairs of keys for encryption and decryption. This cent Advances. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3053998.
process involves complex mathematical operations, relying on the [5] Ayub, N., & Selwal, A. (2020). An improved image steganog-
difficulty of factoring large primes for security. On the other hand, raphy technique using edge based data hiding in DCT do-
AES operates as a symmetric encryption algorithm, employing a main. Journal of Interdisciplinary Mathematics, 23(2), 357–366.
block cipher structure to secure data transmission and storage. https://doi.org/10.1080/09720502.2020.1731949
Once encrypted, the message is embedded into the cover [6] Abdiwahab Mohamed Abdirashid, Serdar Solak, Aditya Kumar Sahu.
medium using steganographic techniques. Least Significant Bit (LSB) Data Hiding Based on Frequency Domain Image Steganography.
steganography subtly alters the least significant bit of each byte [7] Min-Allah, N.; Nagy, N.; Aljabri, M.; Alkharraa, M.; Alqahtani, M.;
Alghamdi, D.; Sabri, R.; Alshaikh, R. Quantum Image Steganography
in the carrier file, while Data Hiding in Space and Time (DST) Schemes for Data Hiding: A Survey. Appl. Sci. 2022, 12, 10294.
steganography leverages spatial and temporal dimensions for effective https://doi.org/10.3390/app122010294.
data concealment. [8] Ragab, Mahmoud & Alshehri, Samah & Alhadrami, Hani & Kateb,
This amalgamation not only safeguards the confidentiality and Faris & Ashary, Ehab & Abdel-khalek, S.. (2022). Encryption
integrity of hidden information but also enhances the system’s with Image Steganography Based Data Hiding Technique in IIoT
resistance against detection and extraction attempts. By critically Environment. Computers, Materials & Continua. 72. 1323-1338.
analyzing existing research in this area, the survey aims to provide 10.32604/cmc.2022.024775.
valuable insights into the efficacy and potential applications of [9] Paniker, Pooja, Vaidehi Dahare, and Anand Saurkar. ”Data Hiding using
cryptographic-steganographic techniques, thereby paving the way for Cryptography and Image/Audio Steganography.” International Research
Journal of Engineering and Technology (IRJET), May 7.05 (2020):
future research and innovation in the field. 1565-1571.
[10] Srinivasarao, T., Yannam, A., Markapudi, B., Chaduvula, K., & Allada,
VII. C ONCLUSION A. (2023). A Smart Strategy for Data Hiding using Cryptography and
The integration of cryptographic methods with steganography Steganography.
presents a formidable approach to enhancing data security within [11] Baso, Fadhlirrahman. (2023). Performance Analysis of The Last Sig-
digital images. By encrypting the payload using established cryp- nificant Bit (LSB) Method in Steganography for Data Hiding in Image
Data. Journal of Security, Computer, Information, Embedded, Network,
tographic algorithms like AES or RSA before embedding it into and Intelligence System. 58-62. 10.61220/scientist.v1i2.20234.
the cover image, confidentiality is maintained even if unauthorized [12] R. Joshi, A. K. Bairwa, V. Soni and S. Joshi, ”Data Secu-
parties gain access to the stego image. Furthermore, employing key rity Using Multiple Image Steganography and Hybrid Data En-
management techniques adds another layer of security by regulating cryption Techniques,” 2022 International Conference for Advance-
access to the concealed data.Through a critical analysis of existing ment in Technology (ICONAT), Goa, India, 2022, pp. 1-7, doi:
research in this area, it is evident that the fusion of cryptographic- 10.1109/ICONAT53423.2022.9725949.
steganographic techniques offers not only confidentiality and integrity [13] S. Karakus and E. Avci, ”Application of Similarity-Based Image
of hidden information but also strengthens resistance against detection Steganography Method to Computerized Tomography Images,” 2019 7th
and extraction attempts. By exploring various combinations such International Symposium on Digital Forensics and Security (ISDFS),
Barcelos, Portugal, 2019, pp. 1-4, doi: 10.1109/ISDFS.2019.8757521.
as AES with LSB or AES with DST steganography, researchers
[14] Mathur, Priya & Gupta, Amit. (2020). A Study of Data Hiding Using
have demonstrated the efficacy of these methods in ensuring secure Cryptography and Steganography. 10.1007/978-981-15-4936-6-1.
communication and covert data transmission.Overall, the combination [15] A. G. Benedict, ”Improved File Security System Using Multiple Im-
of cryptographic and steganographic techniques presents a promising age Steganography,” 2019 International Conference on Data Science
avenue for securing sensitive information transmission. However, and Communication (IconDSC), Bangalore, India, 2019, pp. 1-5, doi:
it is essential to carefully implement these techniques, considering 10.1109/IconDSC.2019.8816946.
[16] R. Rajeswari N and M. M, ”AI-Enhanced LSB Steganography Interface:
Concealed Data Embedding Framework,” 2023 9th International Con-
ference on Smart Structures and Systems (ICSSS), CHENNAI, India,
2023, pp. 1-4, doi: 10.1109/ICSSS58085.2023.10407062.
[17] U. A. S. Raj and C. P. Maheswaran, ”Secure File Sharing System Using
Image Steganography and Cryptography Techniques,” 2023 International
Conference on Inventive Computation Technologies (ICICT), Lalitpur,
Nepal, 2023, pp. 1113-1116, doi: 10.1109/ICICT57646.2023.10134163.
[18] D. Wahono, H. Rahman, H. Syarif, N. J. De La Croix and T. Ahmad,
”Enhancing Data Security Using Steganography in Spatial Domain
Images,” 2024 Second International Conference on Emerging Trends
in Information Technology and Engineering (ICETITE), Vellore, India,
2024, pp. 1-6, doi: 10.1109/ic-ETITE58242.2024.10493831.
[19] S. Bohra, C. Naik, R. Batra, K. Popat and H. Kaur, ”Advancements in
Modern Steganography Techniques for Enhanced Data Security: A Com-
prehensive Review,” 2024 11th International Conference on Computing
for Sustainable Global Development (INDIACom), New Delhi, India,
2024, pp. 941-944, doi: 10.23919/INDIACom61295.2024.10498587.
[20] Z. Zhang, H. Wang and J. Liu, ”A Method for Image Steganog-
raphy based on NICE Model,” 2022 International Conference on
Machine Learning, Cloud Computing and Intelligent Mining (ML-
CCIM), Xiamen, China, 2022, pp. 435-440, doi: 10.1109/MLC-
CIM55934.2022.00080.
[21] V. k. sharma, R. Jaya Krishna, A. Singh and V. S. Rathore, ”Secure
Data Hiding Technique using Secret Image Scrambling,” 2020 4th
International Conference on Electronics, Communication & Aerospace
Technology (ICECA), Coimbatore, India, 2020, pp. 831-836, doi:
10.1109/ICECA49313.2020.9297456.
[22] N. Menon and V. Vaithiyanathan, ”Triple Layer Data Hiding Mechanism
using Cryptography and Steganography,” 2018 3rd IEEE International
Conference on Recent Trends in Electronics, Information & Communi-
cation Technology (RTEICT), Bangalore, India, 2018, pp. 407-410, doi:
10.1109/RTEICT42901.2018.9012633.
[23] A. Harika, S. Anamalamudi, S. Humayra and M. K. Enduri, ”Ap-
plication of Steganography Imaging by AES and Random Bit,” 2021
13th International Conference on Computational Intelligence and Com-
munication Networks (CICN), Lima, Peru, 2021, pp. 177-182, doi:
10.1109/CICN51697.2021.9574676.
[24] K. Dhande and R. Channe, ”A Brief Review on Reversible Data Hiding
in Encrypted Image,” 2019 International Conference on Communication
and Signal Processing (ICCSP), Chennai, India, 2019, pp. 0135-0138,
doi: 10.1109/ICCSP.2019.8697953.
[25] D. Naidu, A. K. K S, S. L. Jadav and M. N. Sinchana, ”Multilayer
Security in Protecting and Hiding Multimedia Data using Cryptogra-
phy and Steganography Techniques,” 2019 4th International Confer-
ence on Recent Trends on Electronics, Information, Communication
& Technology (RTEICT), Bangalore, India, 2019, pp. 1360-1364, doi:
10.1109/RTEICT46194.2019.9016974.
[26] A. Asok and P. Mohan, ”Implementation and Comparison of dif-
ferent Data Hiding Techniques in Image Steganography,” 2019
3rd International Conference on Trends in Electronics and In-
formatics (ICOEI), Tirunelveli, India, 2019, pp. 1180-1183, doi:
10.1109/ICOEI.2019.8862750.
[27] J. Stephy and V. Subramaniyaswamy, ”Analysis of digital image data
hiding techniques,” 2018 2nd International Conference on I-SMAC (IoT
in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in
Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International
Conference on, Palladam, India, 2018, pp. 140-144, doi: 10.1109/I-
SMAC.2018.8653794.
[28] E. Gedkhaw, N. Soodtoetong and M. Ketcham, ”The Performance
of Cover Image Steganography for Hidden Information within Im-
age File using Least Significant bit algorithm,” 2018 18th In-
ternational Symposium on Communications and Information Tech-
nologies (ISCIT), Bangkok, Thailand, 2018, pp. 504-508, doi:
10.1109/ISCIT.2018.8588011.
[29] J. A. R. Kazi, G. N. Kiratkar, S. S. Ghogale and A. R. Kazi, ”A novel
approach to Steganography using pixel-based algorithm in image hid-
ing,” 2020 International Conference on Computer Communication and
Informatics (ICCCI), Coimbatore, India, 2020, pp. 1-6, doi: 10.1109/IC-
CCI48352.2020.9104072.
[30] S. Sravani and R. Raniith, ”Image Steganography for Confidential Data
Communication,” 2021 12th International Conference on Computing
Communication and Networking Technologies (ICCCNT), Kharagpur,
India, 2021, pp. 01-05, doi: 10.1109/ICCCNT51525.2021.9579814.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy