A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding

Abstract

The proposed work introduces an image steganography technique using text-based password that acts as the symmetric key of encryption and decryption. It contains two components, an encoder, and a decoder. An encoder takes a secret image that needs to be hidden inside another cover image. The Combined image is encrypted with an eight characters’ password. The starting position of the cover image from where the secret image starts to hide depends on the password. Then the (Least Significant Bit) LSB Substitution technique is used to hide the entire secret image inside the cover image. The decoder takes the encrypted image and the password to retrieve the secret image back. The proposed work produces an encrypted image by keeping 99% information of the cover image and 100% information of the secret image, thus it provides lossless retrieval of the secret image. The proposed work includes dynamicity of position in steganography that ensures more security of image data over the network than the existing state of art methods.

Authors and Affiliations

Unmesh Mandal, Diotima Nag, Goutam Das, Rimpi Saha

Keywords

Related Articles

Revitalizing Infrastructure: Assessing Concrete Jacketing for Reinforced Concrete Column Rehabilitation

The rehabilitation of deteriorating civil engineering infrastructure, encompassing bridges, buildings, columns, beams, supporting beams, marine structures, and roads, presents a formidable challenge in contemporary engin...

REUSABILITY: A MAJOR ASPECT TO MAINTAINABILITY

This paper focuses on Reusability. Reusability is one of the most significant software quality indicator its correct quantification directs to the prospects of facilitating as well as improving the software maintenance p...

An Examination the Use of Sugarcane Bagasse Ash as Cement Partial Substitutes in Concrete

The strength and shrinkage of concrete that is combined with sugarcane bagasse ash particles are influenced by the size of the particles, as analyzed in this research article. A higher amount of water is required when ut...

Fuzzy Modified TOPSIS for Supplier Selection Problem in Supply Chain Management

Nowadays, global market is highly competitive. Major part of the capital is spent on purchasing raw material/semi finished items. The strategic decision of supply chain is to minimize the expenses on the purchase of item...

Image enhancement in wavelet domain using histogram equalization and median filters

Image enhancement is one of the challenging but crucial methods that is employed in image processing technology for enhancing the visual appearance of images. This paper presents an effective and efficient image enhancem...

Download PDF file
  • EP ID EP745050
  • DOI 10.55524/ijircst.2023.11.5.1
  • Views 59
  • Downloads 0

How To Cite

Unmesh Mandal, Diotima Nag, Goutam Das, Rimpi Saha (2023). A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding. International Journal of Innovative Research in Computer Science and Technology, 11(5), -. https://europub.co.uk/articles/-A-745050