Open Access Open Access  Restricted Access Subscription Access

Text Hiding Under Image Using LSB Method

pavanreddy patlolla, Thati Anirudh, Ms. P. Mangala Tulasi, Ms. Mahammad Nazini

Abstract


In most defense and research organization, they need to send and receive important textual information related to weapon designs, maps, and satellite details. If this textual information is sent normally, hackers can intercept it, and the imported information can be leaked. To prevent this, data can be hidden under an image. This process involves a plain text and an image file. We will use a cover image file and the message, and then taken into consideration the cover image pixels. In that image, we will embed each bit of secret text until the last bit of secret text is hidden under the image. Then we can send this image file to the client, who can use reverse process to retrieve the original text from the image. There are many techniques and algorithms in cyber security to hide data, and each technique has its own importance. The technique used in this study is Least Significant Bit (LSB).


Full Text:

PDF

References


K. Farhan Rafat and S. Muhammad Sajjad, "Advancing Reversible LSB Steganography: Addressing Imperfections and Embracing Pioneering Techniques for Enhanced Security," in IEEE Access, vol. 12, pp. 143434 143457, 2024, doi: 10.1109/ACCESS.2024.3468988.

Y. Wencui, Z. Tingge and L. Ying, "A Review of Deep Learning Based Image Steganography Methods," 2024 6th International Conference on Natural Language Processing (ICNLP), Xi'an, China, 2024, pp. 630-637, doi: 10.1109/ICNLP60986.2024.10692322.

L. Mamdouh and S. Bekhet, "A High-Capacity Image Steganography Based on LSB Inversion and Summing of Bit Pairs," 2024 6th Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2024,

pp. 254 258, doi: 10.1109/NILES63360.2024.10753190.

Q. Li, B. Ma, X. Wang, C. Wang and S. Gao, "Image Steganography in Color Conversion," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 71, no. 1, 10.1109/TCSII.2023.3300330. pp. 106- 110, Jan. 2024, doi:

Kombrink, Meike Helena and Geradts, Zeno Jean Marius Hubert and Worring, Marcel Image Steganography Approaches and Their Detection Strategies: A Survey 2024 February 2025 doi:10.1145/3694965

I. Shukla, A. Joshi and S. Girme, "LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption," 2023 16th International Conference on Security of Information and Networks (SIN),

Jaipur, India, 2023, pp. 1-6, doi: 10.1109/SIN60469.2023.10474976 39

A. D. Molato and F. B. Calanda, "A Secured LSB-Based Image Steganography using Modified Collatz Conjecture," 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, doi:10.1109/ICACCS57279.2023.10113029. 2023, pp.1997-2002,

A. G. Iyer, A. Srivastava, M. Pagarware and M. Bachute, "Image and video steganography using least significant bit technique," 7th IET Smart Cities Symposium (SCS 2023), Hybrid Conference, Bahrain, 2023, pp. 618-622, doi: 10.1049/icp.2024.1027.

Y. Sun, J. Liu and R. Zhang, "A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis," 2023 IEEE International Conference on Multimedia and Expo (ICME), Brisbane, Australia, 2023, pp. 55-60, doi: 10.1109/ICME55011.2023.00018.

P. K. and V. Jaitly, "Securing Medical Images using Compression techniques with encryption and Image Steganography," 2023 3rd International Conference on Intelligent Technologies (CONIT), Hubli, India, 2023, pp. 1-7, doi: 10.1109/CONIT59222.2023.10205855. T. Soukupová and J. Čech, "Real-Time Eye Blink Detection Using Facial Landmarks," in 21st Computer Vision Winter Workshop, 2016.


Refbacks

  • There are currently no refbacks.