0% found this document useful (0 votes)
3 views7 pages

Journal Paper 1 7

The document discusses a comprehensive image steganography system that utilizes Least Significant Bit (LSB) encoding to securely embed hidden images within carrier images while maintaining visual integrity. It highlights the advantages of LSB-based techniques, such as high visual quality and data embedding capacity, while addressing challenges like embedding capacity and metadata handling. The system is designed to be user-friendly, accommodating various image formats and optimizing the embedding process for practical applications in secure communication and data protection.

Uploaded by

Yousuf Aasik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views7 pages

Journal Paper 1 7

The document discusses a comprehensive image steganography system that utilizes Least Significant Bit (LSB) encoding to securely embed hidden images within carrier images while maintaining visual integrity. It highlights the advantages of LSB-based techniques, such as high visual quality and data embedding capacity, while addressing challenges like embedding capacity and metadata handling. The system is designed to be user-friendly, accommodating various image formats and optimizing the embedding process for practical applications in secure communication and data protection.

Uploaded by

Yousuf Aasik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

LSB Based Steganography For Secure Digital

Image Embedding
Hari Krishnan M Mohamed Azim J H
Assistant
UG Scholar
Professor
Department of Computer Science and Engineering
Department of Computer Science and Engineering
Panimalar Engineering College
Panimalar Engineering College
Chennai, India
Chennai, India
mohamedazim017@gmail.com
harik1595@gmail.com
Naresh K
Mohammed Yousuf S UG Scholar
UG Scholar
Department of Computer Science and Engineering
Department of Computer Science and Engineering Panimalar Engineering College
Panimalar Engineering College
Chennai, India
Chennai, India nareshkaruppaiyan123@gmail.com
yousufaasik1805@gmail.com

Abstract—With a comprehensive image steganography


designed to encode and decode multiple hidden images into values in a carrier image, LSB encoding ensures that the
carrier images using the Least Significant Bit (LSB) technique. alterations remain undetectable to the human eye, preserving
The application features a user-friendly graphical user interface the overall visual integrity of the carrier image. This
(GUI) built with Python’s Tkinter library, making it accessible to straightforward yet effective technique has become a
users with diverse technical backgrounds. The encoding process popular choice for real-world applications. However,
discreetly embeds hidden images within carrier images by limitations such as restricted embedding capacity, effective
altering the least significant bits of pixel values, ensuring minimal metadata handling, and reliable decoding need to be resolved
visual distortion to the carrier image. Metadata detailing the to improve the functionality and dependability of LSB-based
dimensions and structure of the hidden images is also steganographic systems.
incorporated alongside the image data to ensure precise
reconstruction during the decoding process. To improve usability, The advantages of LSB-based steganography are rooted
the system accommodates various image formats, dynamically in its ability to maintain high visual quality in carrier images
resizes hidden images to maximize embedding efficiency, and while providing sufficient capacity for data embedding.
automatically manages carrier image capacity to prevent errors. However, the practical implementation of this technique
The decoding module accurately extracts and reconstructs hidden poses several challenges. Overcoming these challenges
images with minimal discrepancies, ensuring reliable
is crucial for building reliable and practical
performance. This project provides a practical and user-friendly
tool for secure communication and data protection. It also sets steganographic systems.
the stage for further advancements, such as integrating To overcome the challenge of capacity constraints,
encryption and optimizing capacity for even greater efficiency. modern LSB-based steganographic systems implement
Keywords: Image Steganography , Least Significant Bit(LSB) techniques such as dynamically resizing hidden data to fit
Encoding , Data Security , Hidden Image Encoding ,Python GUI , within the available space of carrier images. This approach
Metadata Reconstruction , Image Processing , Robust Decoding optimizes the dimensions of the concealed data to ensure
and Steganographic Applications efficient use of the carrier image’s storage capacity while
preserving data integrity. Furthermore, embedding metadata
I. INTRODUCTION that details the structure, dimensions, and sequence of the
hidden content is essential for accurate decoding and
In today's digital era, safeguarding sensitive information from reconstruction. By including this metadata alongside the
unauthorized access is a critical concern. While encryption methods hidden data, these systems ensure the precise retrieval of
are widely used to secure data, they often make the presence of multiple embedded items.
hidden information apparent, potentially drawing unwanted
attention. Steganography, however, offers a subtle alternative by The effectiveness of an LSB-based steganography
concealing data within seemingly ordinary digital media, such as system also relies on its adaptability to various image
images, making the hidden information virtually undetectable to a formats and resolutions. Common formats like PNG and
casual observer. This technique embeds concealed data in a JPEG handle image data differently, influencing the
manner that leaves the carrier medium visually unaltered, ensuring embedding process. For example, PNG utilizes lossless
the concealment remains invisible. This paper presents a practical compression, making it well-suited for steganographic
and efficient image steganography system that utilizes Least applications, whereas JPEG’s lossy compression poses
Significant Bit (LSB) encoding to securely embed hidden images challenges that demand meticulous management.
within carrier images. Developing a flexible system that can accommodate multiple
formats enhances its applicability and usability across a wide
Among the numerous steganographic methods, Least range of scenarios.
Significant Bit (LSB) encoding stands out as one of the most
The scope of LSB-based image steganography extends
efficient and commonly employed techniques for embedding
well beyond secure communication. It also maintains the
data into images. By modifying the least significant bits of pixel
different embedding syatems. It can be employed for
embedding watermarks to assert ownership rights, storing
supplementary metadata within images and even discreetly and Jamzad [3] made a notable contribution to this field by
transmitting sensitive information in environments with strict proposing a contourlet-based steganographic approach that
restrictions. As the demand for privacy and security in the digital embeds data in non-smooth regions of images, such as
realm grows, the possibilities for steganography continue to
edges and textured areas. Their method leverages the
broaden, highlighting the need for ongoing innovation and
contourlet transform, a multi- resolution framework that
advancements in this field.
captures directional and spatial information in an image.
By seamlessly integrating theoretical research with practical
implementation, this work signifies a significant advancement in Vaibhavi and Srivastav [4] made notable advancements
the domain of digital steganography. It converts abstract in practical steganographic systems by developing an LSB-
algorithms and theoretical concepts into a concrete, fully based approach utilizing Python's OpenCV library. Their
functional system tailored to meet the needs of both academic study tackled critical challenges in usability and efficiency,
research and practical real-world applications. Through the delivering a solution that combines technical reliability with
integration of an intuitive graphical user interface (GUI) and a user accessibility, even for non-technical individuals. By
reliable LSB encoding mechanism, the system effectively integrating a graphical user interface (GUI), the proposed
addresses key challenges such as embedding capacity, data system simplifies the embedding and extraction of hidden
integrity, and user accessibility. This ensures that the processes of data, ensuring accessibility for users across varying levels of
embedding and retrieving hidden images are not only secure and expertise, from beginners to professionals.
efficient but also user-friendly and dependable, even for
individuals with limited technical knowledge. This work serves as Dunbar [5] provided insights into steganographic
a cornerstone for applications in secure communication, digital techniques and their applicability in open systems,
watermarking, and copyright protection, while promoting future particularly focusing on LSB-based methods. Marvel et al.
research and advancements in the continually evolving field of [6] made significant strides in the field by introducing the
steganographic technologies. "Spread Spectrum Steganography" technique, which
This study is organized as follows: Section II provides an achieved high levels of robustness and imperceptibility,
overview of the literature survey. Section III details the though it came with the trade-off of increased computational
methodology, emphasizing its key functionalities. Section IV complexity. Lee and Chen [7] developed a high-capacity
presents the results and discusses their implications. Lastly, Section steganographic model for images, balancing data
V concludes with significant findings and recommendations. embedding capacity and imperceptibility. Abraham,
Venkatraman, and Paprzycki [8] emphasized the pivotal role
II. LITERATURE SURVEY
of steganography in safeguarding data, underscoring its
Steganography has been a cornerstone of data security indispensable contribution to contemporary communication
,enabling the concealment of sensitive information within systems.
seemingly innocuous carriers like images, audio, video. Unlike
cryptography, which encrypts data to make it incomprehensible, Metadata plays a pivotal role in ensuring the accurate
steganography conceals the data within a medium, making it decoding and retrieval of embedded data in steganographic
virtually invisible and undetectable. This distinction makes systems. It functions as a foundational framework,
steganography particularly valuable in scenarios where drawing providing crucial insights into the structure and
attention to the presence of protected data may pose additional characteristics of the hidden data. Saleh and Manaf [9]
risks. Venkatraman et al. [1] highlighted the significance of examined the critical role of metadata management within
steganography in secure communication, showcasing its ability cyber protection frameworks, particularly in safeguarding
to embed sensitive information within digital media while web applications against advanced cyber threats. Their
maintaining its perceptual integrity. For example, an image research highlighted metadata as an essential element in
modified using Steganographic techniques would appear maintaining system integrity and functionality, enabling
visually identical to the original, ensuring that the embedded precise identification, reconstruction, and verification of
data is undetect . vital information. This ensures that even when multiple
carriers or complex embedding strategies are involved, the
The Least Significant Bit (LSB) encoding technique has retrieval process remains seamless and accurate.
become one of the most popular and effective methods in image
steganography, valued for its simplicity, efficiency, and capacity Compression techniques have significantly improved
to embed data without causing noticeable alterations to the carrier the efficiency and effectiveness of steganographic systems.
image. By modifying the least significant bits of pixel values In By minimizing the size of the data to be embedded,
an image, this method ensures that the embedded information compression enhances the utilization of the carrier medium.
remains invisible to the human eye, thereby preserving the Srivastav et al. [10] conducted an in-depth analysis of
original appearance of the carrier image. Since the change in the compressed pattern matching, illustrating how advanced
pixel value is minimal, it is virtually undetectable even under compression algorithms can be seamlessly integrated into
detailed visual inspection. Johnson and Jajodia [2] conducted an steganographic systems to enhance their efficiency and
in-depth analysis of LSB encoding, emphasizing its efficiency in effectiveness. Their research demonstrated that compressed
embedding sensitive information within digital images. They data requires fewer bits to represent the same information,
emphasized the simplicity of the technique, which makes it allowing for a higher embedding capacity within the carrier.
computationally efficient and suitable for a wide range of
applications, from covert communication to digital water- Wang and Wang [11] examined the applications of
marking. steganography and steganalysis within cyber warfare,
highlighting their significance in implementing both
Adaptive methods have significantly enhanced the field offensive measures and defensive approaches. Petitcolas,
of steganography by introducing intelligent embedding strategies Anderson, and Kuhn [12] conducted an extensive survey on
that consider the unique characteristics of the carrier medium. information-hiding methods, such as steganography and
Unlike traditional techniques, which often apply uniform watermarking, thoroughly examining their challenges and
modification across the carrier, adaptive methods analyze the potential future advancements research directions.
properties of the carrier, such as texture, edges and
smoothness to identify optimal regions for embedding data .
Sajedi
Gupta and Kumar [13] conducted a comparative analysis The integration of steganography within digital rights
of SHA and MD5 algorithms, emphasizing the vulnerabilities management (DRM) systems has become a pivotal approach
of MD5 and effectiveness of SHA for data integrity to preventing the unauthorized use and distribution of
applications. copyrighted materials.Mahajan and Sachdeva [22] evaluated
Human visual perception plays a critical role in shaping the the AES, DES, and RSA encryption algorithms, offering
design and effectiveness of steganographic systems, particularly insights into their performance and applicability for different
those aimed at embedding information into digital images. security scenarios. Watermarking, a specialized application of
Handel and Sandford [14] investigated data hiding within the steganography, involves embedding hidden information within
OSI network model, unveiling novel opportunities for digital media to signify ownership or authenticity.
embedding techniques, though challenges persisted in practical Steganography has evolved significantly with the advent
implementation. Chandramouli, Kharrazi, and Mermon [15] of modern communication networks, finding new and
contributed significant practical insights into human innovative applications in the creation of covert
steganography and steganalysis, successfully bridging the gap communication channels. Moerland [23] examines the
between theoretical exploration and real-world application. techniques to detect hidden data in media and highlights how
Currie and Irvine [16] carried out a comprehensive advancements in detection methods impact the development of
analysis of the challenges that lossy compression algorithms, steganographic systems. These advancements enable
like JPEG, present to the integrity of steganographic data. Their steganography to provide secure and inconspicuous
research focused on the effects of compression-induced errors communication solutions within distributed systems,
on data embedded within digital images, a critical issue given effectively addressing the growing demand for privacy and
the widespread use of compressed formats in modern security in today’s interconnected digital landscape.
communication and storage systems. Lossy compression, Owens [24] examined the role of covert channels in
designed to reduce file size by eliminating redundant or non- secure communication frameworks, identifying potential
essential information, often leads to significant modifications in vulnerabilities and proposing resilient models for secure data
an image's pixel values. Although these alterations are typically exchanges. In IoT environments, where bandwidth and
imperceptible to human vision, they can disrupt or destroy computational resources are often limited, traditional
steganographically embedded data, presenting a serious encryption methods can be impractical, highlighting the
challenge to the reliability and effectiveness of steganographic necessity for optimized and efficient steganographic
systems. techniques.
The researchers emphasized how the JPEG compression
III. EXISTING SYSTEM
algorithm, widely utilized for image storage and transmission,
converts image data into the frequency domain using a discrete The existing system for data hiding predominantly rely
cosine transform (DCT). During this process, high-frequency on traditional steganographic methods, cryptographic
components-which often include subtle pixel-level techniques, or a combination of both. While these methods
modifications-are heavily quantized or eliminated to achieve have been instrumental in securing sensitive information, they
compression. This quantization process introduces distortions suffer from several limitations related to imperceptibility,
that disproportionately affect data embedded in the least embedding capacity, robustness and usability. The
significant bits (LSBs) of pixels, rendering simple LSB concealment of hidden data is a crucial aspect of any
encoding techniques ineffective. Jiawei Hu [17] proposed an steganographic system. However, many existing techniques
optimized LSB steganography algorithm aimed at enhancing fail to achieve this, leaving the embedded data exposed to
copyright protection for electronic resources. The method detection through statistical analysis or steganalysis tools.
involves encoding text into images using a random search Fixed embedding patterns, commonly used in traditional
algorithm to optimize the embedding process methods, further exacerbate this vulnerability as they exhibit
predictable behaviors that can be easily identified.
Muhammad Adnan Aslam et al. [18] conducted a
systematic review of LSB-based image steganography, A notable drawbacks of traditional steganographic
analyzing 20 studies to identify 17 algorithms and 20 datasets. techniques, such as the Least Significant Bit (LSB)
The study noted challenges with data size and secrecy, embedding method, is their failure to maintain the visual
advocating for hybrid techniques to enhance LSB applications. quality of carrier images after embedding data. These
Traditional steganographic methods, particularly those methods often introduce noticeable artifacts or distortions into
employing simple techniques like Least Significant Bit (LSB) the carrier image, compromising its visual quality. This
encoding, often lack the robustness needed to withstand these drawback also heightens the risk of detection, thereby
modifications. As a result, data embedded through these undermining the fundamental purpose of steganography.
techniques can become irretrievable when subjected to common Furthermore, techniques that focus on maximizing embedding
operations performed on digital media. capacity often compromise imperceptibility, resulting in a
challenging trade-off that is difficult to optimize.
Petitcolas et al. [19] conducted an in-depth study on the
evolution of steganography, tracing its historical origins and Additionally, traditional steganographic methods often
highlighting its advancement into a sophisticated tool for secure struggle with adaptability to modern digital environments,
digital communication, ensuring reliable data transfer while where data compression, format conversions, and other
maintaining confidentiality. Srivastav, Singh, and Yadav [20] routine processes are prevalent. These methods are typically
introduced an innovative method for compressed text matching vulnerable to such operations, as the embedded data can be
using WBTC and wavelet trees, which improved accuracy and distorted or completely lost when the carrier media undergoes
minimized false positives, albeit with an increase in transformations like lossy compression. As a result, there is a
computational complexity. Krenn [21] made a substantial growing demand for innovative approaches that strike a
contribution by offering a comprehensive analysis of balance between imperceptibility, robustness, embedding
steganography and steganalysis, emphasizing their practical capacity, and ease of use, ensuring the secure and seamless
applications in real-world scenarios. integration of hidden data.
Modern data-hiding systems face significant challenges in
preserving robustness when carrier images are subjected to
various transformations or modifications. Common operations
such as compression, resizing, cropping, and other alterations
applied during storage, transmission, or editing can easily
disrupt the embedded data, often resulting in its loss or
rendering it inaccessible. This limitation is especially worrisome
in practical situations where digital images are often subjected
to numerous alterations. Moreover, many of these systems lack
intuitive, user- friendly designs, making them inaccessible to
individuals without technical expertise. The complexity of
current implementations often demands specialized knowledge,
thereby restricting their usability to a limited audience with
technical proficiency.
For example, social media platforms routinely perform
automated transformations such as format conversion or
adaptive compression on uploaded images, which can jeopardize
the integrity of embedded data. Despite these real-world
challenges, most existing systems undergo limited assessments
for robustness, casting doubts on their reliability in practical
applications. Another notable limitation is the absence of hybrid
approaches that effectively combine the strengths of
cryptographic and steganographic techniques to enhance
security. While some systems incorporate encryption prior to Fig 1: System Architecture
data embedding, they often fail to deliver seamless or optimized transmission errors and alterations, including
frameworks that effectively balance robust security with user- compression, resizing, and cropping.
friendly functionality. As data security threats continue to
evolve, these systems are frequently ill-prepared to defend The proposed system also emphasizes accessibility
against advanced attacks, including targeted steganalysis or through a user-friendly user interface (GUI). Designed to
machine- learning-based detection methods. cater to users with varying levels of technical expertise,
the GUI provides real-time feedback, clear progress
These issues highlight the urgent need for a next- indicators, and error notifications, simplifying the
generation data-hiding system that addresses these steganographic process. The system's adaptability is
shortcomings. Such a system should prioritize imperceptibility, further enhanced by customizable features, including the
maintain high embedding capacity without compromising the option to select between sequential and randomized
visual quality of the carrier, and leverage adaptive algorithms to embedding modes, making it suitable for a wide range of
withstand real- world transformations. Additionally, it should applications.
feature user- friendly interfaces and workflows to broaden
accessibility, ensuring usability for both technical and non-
technical audiences. By overcoming these challenges, a modern Metric Existing Proposed
steganography system can provide a secure, robust, and System System
practical solution for protecting sensitive information in today's
PSNR 70% 90%
digital landscape.
Robustness 60% 85%

IV. PROPOSES SYSTEM Embedding capacity 50% 80%

The proposed system introduces an advanced and user- Error Recovery 40% 90%
centric approach to steganography, aiming to address the Usability 50% 95%
limitations of traditional methods by focusing on
imperceptibility, robustness, and usability. It employs an Resilience to 55% 88%
enhanced least significant bit (LSB) embedding technique Compression and
tailored for high-resolution, lossless image formats such as Resizing
BMP and PNG. This ensures that the embedded data remains Table 1: Performance Metrics
visually undetectable, preserving the carrier image’s original
quality. Unlike conventional systems that often produce In addition to its functionality, the system is
noticeable artifacts, the proposed system prioritizes high- optimized for computational efficiency, making it
quality outputs, evaluated using metrics like Peak Signal-to- capable of handling real-time applications. The system's
Noise Ratio (PSNR) and Structural Similarity Index (SSIM), optimized embedding and retrieval processes result in a
achieving values that surpass 50 dB and 0.95, respectively. processing time reduction of up to 40% compared to
traditional methods. It provides a secure, efficient, and
The proposed system ensures robustness by incorporating scalable solution for modern steganographic needs. By
metadata and error-correction codes, enhancing its ability to addressing the weaknesses of conventional systems and
withstand various transformations and errors. The embedded integrating advanced features, it establishes itself as a
metadata includes vital information such as image dimensions trustworthy solution for safeguarding sensitive
and sequential details,ensuring precise alignment and decoding information.
even in the presence of minor distortions. Furthermore, error-
correction codes enhance the system's capacity to withstand
V. METHODOLOGY
detection through steganalysis more difficult. The
A. Data Collection embedding process ensures that the carrier image has
The data collection process entails gathering a diverse range of sufficient capacity to store the hidden data while preserving
high-quality cover images designed to function as carriers for its original quality. Built-in error detection mechanisms
embedding concealed data. These images are meticulously chosen ensure the integrity of the embedded data by identifying
from lossless formats like BMP and PNG to preserve the integrity and addressing any inconsistencies. This method achieves
of the embedded information. The dataset is designed to include a an optimal balance between imperceptibility, security, and
wide range of images with varying attributes, such as resolutions, robustness, ensuring that the carrier image retains its
color depths, and visual content, ensuring a thorough evaluation original appearance while securely concealing the hidden
of the steganographic method's versatility and robustness. Special data. Replace the least significant bit of the carrier image’s
attention is given to ensuring that the images are free from prior pixel with a bit of the hidden data:
compression artifacts or noise, as these could affect the accuracy
of data embedding and retrieval. This collection phase is to
validate the methodology under varied real-world scenarios,
providing a robust foundation for the implementation and testing
of the LSB- based steganographic system.
Where:
B. Preprocessing
 P: Original pixel value (0-255).
The Image preprocessing ensures optimal preparation of both
carrier and hidden images, facilitating seamless embedding and  B: Bit of the hidden data.
retrieval. High-resolution carrier images in lossless formats,
 P’: Modified pixel value
such as BMP or PNG, are chosen to maintain data integrity
throughout the process. The hidden image is resized or D. Extraction Process
reformatted to align with the carrier's embedding capacity,
ensuring compatibility while maintaining its quality. Moreover, The extraction process involves reversing the Least
metadata in binary form, which includes essential information Significant Bit (LSB) embedding procedure to retrieve the
about the hidden image such as its dimensions and sequence, is hidden data from the carrier image. The process begins with
created and attached to the hidden data. This metadata ensures the system analyzing the pixels of the carrier image to
accurate reconstruction of the hidden image during the decoding extract the binary data hidden within the least significant
phase, establishing a robust foundation for the steganography bits. The process begins by locating and extracting the
system. The preprocessing stage also verifies the integrity of metadata, which contains essential information such as the
both images to prevent embedding errors, ensuring smooth dimensions, sequence, and format of the hidden image. This
downstream processing. Advanced checks are performed to metadata is crucial for guiding the reconstruction process
verify the integrity of both images, mitigating potential errors and ensuring accuracy. After the metadata is decoded, the
during the embedding process. Techniques to manage edge system methodically extracts the binary data corresponding
cases, such as compatibility between two images, further refine to the hidden image from the carrier image. Error-
this stage. This thorough preprocessing guarantees consistency correction mechanisms, such as Hamming codes or cyclic
and dependability, forming a vital groundwork for the next redundancy checks (CRC), are applied to identify and
stages of the steganographic procedure. correct any discrepancies caused by distortions during
transmission or compression. After error correction, the
binary data is converted back into its original format,
restoring the hidden image. This step guarantees the
accurate reconstruction of the hidden data, preserving the
integrity of the steganographic system.
Metadata contains essential information such as the dimension
of the hidden image: Retrieve the least significant bit from each pixel:

M=H+W+L
Where:
 H: Height of the hidden image. Use the extracted metadata for accurate reconstruction:

 W: Width of the hidden image


 L: Length of the hidden data in bits.
E. Evaluation and Testing
C. Embedding process
The system undergoes extensive testing with a diverse
The LSB encoding technique integrates the binary data of the range of carrier images varying in resolution and format to
hidden image and metadata into the least significant bits of the assess its versatility. Essential performance metrics,
carrier image's pixels. First, the pixel data of the carrier and including imperceptibility, embedding capacity,
hidden images, along with metadata, is converted into binary robustness, and computational efficiency, are carefully
form. The metadata contains crucial details like dimensions and evaluated. Imperceptibility is analyzed by assessing the
sequence, ensuring accurate reconstruction during decoding. visual quality of carrier images pre- and post-embedding,
Sequential embedding systematically replaces the least significant utilizing metrics such as Peak Signal-to-Noise Ratio
bits of carrier image pixels with the binary data, maintaining (PSNR) and Structural Similarity Index (SSIM) to confirm
minimal visual distortion. For improved security, a randomized minimal perceptual variations. Robustness testing
embedding approach can scatter the data across the carrier involves subjecting carrier
image, making
images to transformations such as resizing, compression, and interface to guide users through each step and confirm
noise addition to evaluate the system's ability to retrieve hidden successful operations. The application is designed to
data with accuracy. The embedding capacity is evaluated to address real-world use cases, with a strong focus on
determine the maximum volume of data that can be embedded security, efficiency, and user-friendliness. To improve
without introducing visible distortions. Computational accessibility, it accommodates various image formats,
efficiency is evaluated by analyzing the time and resources while offering error alerts and troubleshooting support.
utilized during the embedding and extraction processes. These The implementation incorporates robust back-end
evaluations provide a thorough understanding of the system's algorithms for LSB encoding and decoding, ensuring
performance, ensuring its effectiveness for real-world seamless and accurate data processing. Additionally,
applications while preserving both data security and quality. advanced features like encryption for added security and
Peak Signal-to-Noise Ratio (PSNR): randomized embedding patterns for increased robustness
are included. Overall, the system is designed to meet the
demands of practical applications while maintaining a
balance between user convenience and technical
sophistication .
VI. RESULT AND DISCUSSION
Where:
The LSB-based steganography system's performance was
 MAX: Maximum pixel intensity (255 for 8-bit thoroughly assessed using a range of critical metrics to
images). evaluate its efficiency and real-world applicability. The first
metric, imperceptibility, was measured using Peak Signal-
 MSE: Mean Squared Error: to-Noise Ratio (PSNR) and Structure Similarity Index
(SSIM), both of which confirmed that the carrier images
retained high visual quality even after embedding hidden
data. These metrics confirmed that the changes caused by
embedding remained undetectable to the human eye,
preserving the carrier images' visual integrity. Key metrics
such as imperceptibility, embedding capacity, robustness,
computational efficiency, and user experience were used
Structural Similarity Index (SSIM): for evaluation.

The imperceptibility of the system, which measures the


visual quality of the carrier images post-embedding, was
found to be exceptional. Consistently high Peak Signal-to-
Noise Ratio (PSNR) values, exceeding 40dB, confirmed
that the embedded images exhibited minimal distortion and
Embedding Capacity: remained visually indistinguishable from their original
counterparts. Structural Similarity Index (SSIM) values
close to 1.0 further validated the preservation of visual and
structural integrity. Qualitative evaluations conducted by
human observers further validated that the carrier images
with embedded data displayed no visible signs of
Where: modification, ensuring that the hidden information
 N: Number of pixels in the carrier image. remained inconspicuous.

 B: Number of bits used per Another crucial aspect of evaluation focused on the
system's embedding capacity.. High-resolution carrier
pixel. Computational Efficiency: images, particularly those in BMP and PNG formats,
demonstrated a significant ability to embed hidden data
while retaining their visual quality. For instance, a 1080p
carrier image was capable of embedding hidden data up to
25% of its size while maintaining superior visual quality.
Qualitative assessments by human observers also confirmed
that the embedded carrier images showed no visible signs
Where: of tamper.

 T: Time for embedding/retrieval The results also emphasized the practical implications
 R: Bits processed per second. of the system. Applications such as secure
communication, digital watermarking, and data
F. Implementation Details protection were identified as key areas where the system
The system is implemented as a user-friendly application could be deployed effectively. The ability to embed
featuring an intuitive graphical user interface (GUI) designed to sensitive information discreetly, coupled with robust
make the embedding and retrieval of hidden data accessible to retrieval mechanisms, makes the system highly relevant
both technical and non-technical users. The GUI simplifies the in today's generation.
interaction by providing straightforward options for selecting
carrier images, preparing hidden data, initiating the encoding or
decoding process. Real-time feedback is integrated into the
VII. CONCLUSION

The LSB-based steganography system designed in this of lossy compression on steganography” , 19th national
project provides a reliable, efficient, and accessible solution information systems security conference, 1996.
for securely embedding digital images. It addresses key
limitations of traditional methods by ensuring high [14] Handel, T. &Sandford, M., “ hiding data in the
imperceptibility, validated through PSNR and SSIM metrics, OSI network model” , proceedings of the 1st international
and integrating error-handling mechanisms that enhance data workshop on information hiding, June 1996.
resilience against minor distortions. The system is equipped [15] Petitcolas, F.A, P., Anderson, R.J. & Kuhn,
with a user-friendly graphical interface (GUI), ensuring M.G., “ Information hiding – a survey” , proceedings of
accessibility for both technical and non-technical users. Its the IEEE, 87:07, July 1999.
optimized computational efficiency ensures swift [16] Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “
processing, even for high-resolution images, making it well- spread spectrum steganography” , IEEE transactions on
suited for real-time applications such as secure image processing, 8:08, 1999.
communication and data protection. Although the system
demonstrates excellent performance, with strong [17] P. Mahajan and A. Sachdeva, “ A Study of
imperceptibility and robust data retrieval, it exhibits Encryption Algorithms AES, DES and RSA for
limitations under extreme transformations or lossy Security,” vol. 13, no. 15, 2013.
compression. Overall, the project showcases the feasibility [18] R. Biswas, S. Bandyopadhyay, and A. Banerjee, “
of an enhanced LSB-based steganography system as a A FAST IMPLEMENTATION OF THE RSA
reliable solution for secure data embedding in diverse ALGORITHM USING,” pp. 1– 15, 2014.
application.
[19] P. Gupta and S. Kumar, “A Comparative Analysis
of SHA and MD5 Algorithm A Comparative Analysis of
SHA and MD5 Algorithm,” no. July, 2014.
REFERENCES
[20] Attacks International Symposium on Biometrics
[1] Johnson, N.F. &Jajodia, S., “ Exploring Steganography: and Security Technologies (ISBAST 2014),May 2014
Seeing the Unseen” , Computer Journal February 1998. (IEEE).

[2] . Owens, M., “ A Discussion of covert channels and [21] Muhammad Adman Aslam, Muhammed
steganography” , SANS Institute, 2002. Rashid, Farooque Azam, Muhammad Abbas, Yawrar
Rasheed, Saud S Alotaibi, Muhammed Waseem Anwar
[3] Moerland, T., “ Steganography and Steganalysis” , (2022) “ Image Steganography using Least Significant
Leiden Institute of Advanced Computing Science. Bit (LSB) - A Systematic Literature Review”, IEEE.
[4] Dunbar, B., “ Steganograpic techniques and their use in [22] H. Sajedi, & M.Jamzad, “Adaptive
an open-systems environment” , SANS Institute, January steganography method”, In Proc. Of the 9th International
2002. Conference of the signal processing, IEEE, 2008,
[5] 6. Marvel, L.M., Boncelet Jr., C.G. &Retter, C., “ pp.745- 748.
spread Spectrum steganography” , IEEE Transactionson [23] Srivastav, S., Singh, P. K., & Yadav, D. (2020).
image processing, 8:08, 1999. An approach for fast compressed text matching and to
[6] Lee, Y.K. & Chen, L.H., “ High capacity image avoid false matching using WBTC and wavelet tree. EAI
steganographic model” , visual Image signal processing, Endorsed Transactions on Scalable Information Systems,
147:03, June 2000. 8(30), e6

[7] Venkatraman, S., Abraham, A. &Paprzycki, M., “ [24] Jiawei Hu (2024) Image Steganography based
Significance of Steganography on data security” Proceedings of on improved LSB algorithm Wuhan University of
the International Conference on information technology.

[8] Johnson, N.F. & Jajodia, S., “ Steganalysis of images [25] Mohammed A. Saleh and Azizah Abdul Manaf.
created using current steganography software” , Proceedings Optimal Specifications for a Protective Framework
of the 2nd Information Hiding Workshop, April 1998. against HTTP-based DoS and DDoS

[9] Wang, H &wang, S, “ cyber warfare: steganography


vs. steganalysis” , communications of the ACM, 47:10, October
2004.
[10] Krenn, R., “ steganography and steganalysis” , IBM
Systems and journal, vol. 33, 1997.
[11] Chandramouli, R., Kharrazi, M. & Memom, N., “
Image steganography and steganalysis: Concepts and
practice”
, Proceedings of the 2nd international workshop on digital
watermaking, October 2003.
[12] Currie, D.L. & Irvine, C.E., “ Surmounting the
effects of lossy compression on steganography” , 19th
national information systems security conference, 1996.
[13] Currie, D.L. & Irvine, C.E., “ Surmounting the effects

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy