Abstract
Steganography is the technique in which the information is hidden within the objects so that the viewer cannot track it down and only the reserved recipient will be able to see it. The data can be concealed in different mediums such as text, audio and video files. Hiding the information in image or picture files is called image steganography. This steganography method helps in protecting the data from malicious attacks. The image chosen for steganography is known as cover image and the acquired image as stego image. A digital image can be described using pixel values, and those values will be modified using least significant bit (LSB) technique. To increase the security, various LSB techniques had been proposed. We made a comparison on various image steganography techniques based on the parameters like robustness, imperceptibility, capacity and security. In this paper, based on the comparisons we have suggested few image steganography algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ardy RD, Indriani OR, Sari CA, Setiadi DRIM, Rachmawanto EH (2017) Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5). In: IEEE International conference on smart cities, automation & intelligent computing systems (ICON-SONICS), pp 87–92
Astuti YP, Setiadi DRIM, Rachmawanto EH, Sari CA (2018) Simple and secure image steganography using LSB and triple XOR operation on MSB. In: International conference on information and communications technology (ICOIACT), pp 191–195
Bhavani Y, Sai Srikar P, Spoorthy Shivani P, Kavya Sri K, Anvitha K (2020) Image segmentation based hybrid watermarking algorithm for copyright protection. In: 11th IEEE international conference on computing, communication and networking technologies (ICCCNT)
Bhuiyan T, Sarower AH, Karim R, Hassan M (2019) An image steganography algorithm using LSB replacement through XOR substitution. In: IEEE international conference on information and communications technology (ICOIACT), pp 44–49
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Sign Process 51(7):1995–2007
Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. In: Delp EJ, Wong PW (eds) IS&T/SPIE electronic imaging: security, steganography, and watermarking of multimedia contents VI. SPIE, San Jose, pp 23–34
Islam MR, Siddiqa A, Uddin MP, Mandal AK, Hossain MD (2014) An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: IEEE international conference on informatics, electronics & vision (ICIEV), pp 1–6
Ker AD (2005): Steganalysis of LSB matching in gray scale images. IEEE Sign Process Lett 12(6):441–444
Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. J. Radio Eng 18:509–516
Joshi K, Dhankhar P, Yadav R (2015) A new image steganography method in spatial domain using XOR. In: Annual IEEE India conference (INDICON), pp 1–6, New Delhi
Irawan C, Setiadi DRIMC, Sari A, Rachmawanto EH (2017) Hiding and securing message on edge areas of image using LSB steganography and OTP encryption. In: International conference on informatics and computational sciences (ICICoS), Semarang
Swain G ((2016)) Digital image steganography using variable length group of bits substitution. Proc Comput Sci 85:31–38
Channalli S, Jadhav A (2009) Steganography an art of hiding data. J Int J Comput Sci Eng (IJCSE) 1(3)
Dhaya R (2021) Analysis of adaptive image retrieval by transition Kalman filter approach based on intensity parameter. J Innov Image Process (JIIP), pp 7–20
Manoharan JS (2016) Enhancing robustness of embedded medical images with a 4 level Contourlet transform. Int J Sci Res Sci Eng Technol pp 149–154
Mathew N, Manoharan JS (2012) A hybrid transform for robustness enhancement of watermarking in medical images. Int J Digital Image Process 4(18):989–993
Bhardwaj R, Sharma V (2016) Image steganography based on complemented message and inverted bit LSB substitution. Proc Comput Sci 93:832–838
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhavani, Y., Kamakshi, P., Kavya Sri, E., Sindhu Sai, Y. (2022). A Survey on Image Steganography Techniques Using Least Significant Bit. In: Hemanth, D.J., Pelusi, D., Vuppalapati, C. (eds) Intelligent Data Communication Technologies and Internet of Things. Lecture Notes on Data Engineering and Communications Technologies, vol 101. Springer, Singapore. https://doi.org/10.1007/978-981-16-7610-9_20
Download citation
DOI: https://doi.org/10.1007/978-981-16-7610-9_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7609-3
Online ISBN: 978-981-16-7610-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)