Skip to main content

A Secured Steganography Algorithm for Hiding an Image and Data in an Image Using LSB Technique

  • Conference paper
  • First Online:
Computational Methods and Data Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1257))

Abstract

Recent advances in computer security have shown that the most effective way to secure information is to hide information rather than encrypt it. Hiding facts is that the art and technological know-how of hidden writing is a manner to hide records in a completely specific form of data. In addition, hidden textual content or pictures with the cover photograph and change some objects from the preliminary bit to the recipient. A record report or picture is hidden in the cowl photograph will steady the attacker's authentic facts or statistics. The least significant bit technique (LSB) may be an unremarkably used technique of activity data and is prone to attack owing to its simplicity. During this analysis, it shows that the way to use the operator's image to cover a picture and different knowledge. In this, a tendency to compare the signal-to-noise ratio (PSNR) and the error squared error (MSE) to determine the level at which the stego image is masked with the cover image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Reference

  1. Madhu B, Gopalakrishna Kini N, Kini VG, Gautam (2019) A secured steganography algorithm for hiding an image in an image. In: Integrated intelligent computing, communication and security, studies in computational intelligence, vol 771, Springer Nature, Singapore Pte Ltd., pp 539–546

    Google Scholar 

  2. Gedkhaw E, Soodtoetong N, Ketcham M (2018) The performance of cover image steganography for hidden information within image file using least significant bit algorithm. In: IEEE The 18th international symposium on communications and information technologies (ISCIT 2018), pp 504–508

    Google Scholar 

  3. Menon N, Vaithiyanathan (2017) A survey on image steganography. In: IEEE international conference on technological advancements in power and energy (TAP Energy), pp 1–5

    Google Scholar 

  4. Singh A, Chauhan M, Shukla S (2018) Comparison of LSB and proposed modified DWT algorithm for image steganography. In: IEEE international conference on advances in computing, communication control and networking (ICACCCN2018), pp 889–893

    Google Scholar 

  5. Swain G (2018) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Springer Arabian J Sci Eng 1–8

    Google Scholar 

  6. Prashanti G, Sandhyarani K (2015) A new approach for data hiding with LSB steganography. In: Emerging ICT for bridging the future, vol 2. Advances in intelligent systems and computing, vol 338, pp 423–430. Springer International Publishing, Switzerland

    Google Scholar 

  7. Bhardwaj R, Sharma V (2016) Image steganography based on complemented message and inverted bit LSB substitution. In: 6th international conference on advances in computing & communications, ICACC 2016, 6–8 Sept 2016, Cochin, India. Procedia Computer Science 93:832–838

    Google Scholar 

  8. Al-Afandy KA, EL-Rabaie EM, Faragallah OS, Elmhalawy A, El-Banby GM (2016) High-security data hiding using image cropping and LSB least significant bit steganography. In: IEEE, pp 400–404

    Google Scholar 

  9. Anjum A, Islam S (2016) LSB steganalysis using modified weighted stego image method. In: IEEE 3rd international conference on signal processing and integrated networks (SPIN), pp 630–635

    Google Scholar 

  10. Joshi K, Yadav R (2015) A new LSB-S image steganography method blend with cryptography for secret communication. In: IEEE third international conference on image information processing, pp 86–90

    Google Scholar 

  11. Dehare P, Bonde P (2014) Hiding image in image by using FMM with LSB substitution in image steganography. Int J Adv Res Comput Sci Manag Stud 2(11):455–459

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaibhav Singh Shekhawat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shekhawat, V.S., Tiwari, M., Patel, M. (2021). A Secured Steganography Algorithm for Hiding an Image and Data in an Image Using LSB Technique. In: Singh, V., Asari, V.K., Kumar, S., Patel, R.B. (eds) Computational Methods and Data Engineering. Advances in Intelligent Systems and Computing, vol 1257. Springer, Singapore. https://doi.org/10.1007/978-981-15-7907-3_35

Download citation

Publish with us

Policies and ethics