

Hiding Text in the Image Using LSB
Abstract
In the majority of defense and research institutions, they have to send and receive critical textual data with respect to weapon models, maps, and satellite information. If the textual data is transmitted in a normal way, it can be intercepted by hackers, and the imported data can be disclosed. To avoid this, data can be encoded under an image. It is a technique that includes a plain text and an image file. We will employ the cover image file and message, and then considered the cover image pixels. In that image, we will insert each secret text bit until the last secret text bit gets concealed under the image. Then we can transmit this image file to the client, who can decode the original text from the image using reverse process. There are several methods and algorithms in cyber security to conceal data, and each method is significant. The method applied to this study is Least Significant Bit (LSB). Information Security is the procedures and processes which are developed and apply for safeguarding print, electronic, or any other type of confidential, private and sensitive information or data from unauthorized use, utilization, misuse, revelation, destruction, alteration, or interference. Image hiding is the act of concealing data inside an image file. Thus, securing image data from unauthorized use is crucial. Image encryption is a key contributor in the area of information hiding. Image hiding or encryption techniques and algorithms vary from straightforward spatial domain techniques to more complex and robust frequency domain techniques.
References
"Advancing Reversible LSB Steganography: Embracing Pioneering Techniques and Addressing Imperfections for Enhanced Security," by Liang ,K. Farhan Rafat and S. Muhammad Sajjad, in IEEE Access, vol. 12, pp. 143434 143457, 2024, doi: 10.1109/ACCESS.2024.3468988.
Y. Wenchi, Z. Tinggi and L. Ying, "A Review of Deep Learning Based Image Steganography Methods," 2024 6th Natural Language Processing (ICNLP) on International Conference, Xi'an, China, 2024, pp. 630-637, doi: 10.1109/ICNLP60986.2024.10692322.
L. Mamdouh and S. Bekhet, "A High-Capacity Image Steganography Based on LSB Inversion and Summing of Bit Pairs," 2024 6th Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2024, pp. 254 258, doi: 10.1109/NILES63360.2024.10753190.
Q. Li, B. Ma, X. Wang, C. Wang and S. Gao, "Image Steganography in Color Conversion," in IEEE Systems and Transactions on Circuits II: Express Briefs, vol. 71, no. 1, 10.1109/TCSII.2023.3300330. pp. 106-110, Jan. 2024, doi:
Kombrink, Meike Helena and Geradts, Zeno Jean Marius Hubert and Worring, Marcel Image Steganography Approaches and Their Detection Strategies: A Survey 2024 February 2025 doi:10.1145/3694965
I. Shukla, A. Joshi and S. Girme, "LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption," 2023 16th International Conference on Security of Information and Networks (SIN), Jaipur, India, 2023, pp. 1-6, doi: 10.1109/SIN60469.2023.10474976.
A. D. Molato and F. B. Calanda, "A Secured LSB-Based Image Steganography using Modified Collatz Conjecture," 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2023, doi:10.1109/ICACCS57279.2023.10113029. pp. 1997-2002.
A. G. Iyer, A. Srivastava, M. Pagar ware and M. Bachata, "By least significant bit Image and video steganography technique," 7th IET Smart Cities Symposium (SCS 2023), Hybrid Conference, Bahrain, 2023, pp. 618-622, doi: 10.1049/icp.2024.1027.
Y. Sun, J. Liu and R. Zhang, "A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis," 2023 IEEE Multimedia and Expo (ICME) International Conference on, Brisbane, Australia, 2023, pp. 55-60, doi: 10.1109/ICME55011.2023.00018.
P. K. and V. Jaitly, " Compression techniques with encryption Securing Medical Images using and Image Steganography," 2023 3rd International Conference on Intelligent Technologies (CONIT), Hubli, India, 2023, pp. 1-7, doi: 10.1109/CONIT59222.2023.10205855.
Refbacks
- There are currently no refbacks.