A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding

Abstract

The proposed work introduces an image steganography technique using text-based password that acts as the symmetric key of encryption and decryption. It contains two components, an encoder, and a decoder. An encoder takes a secret image that needs to be hidden inside another cover image. The Combined image is encrypted with an eight characters’ password. The starting position of the cover image from where the secret image starts to hide depends on the password. Then the (Least Significant Bit) LSB Substitution technique is used to hide the entire secret image inside the cover image. The decoder takes the encrypted image and the password to retrieve the secret image back. The proposed work produces an encrypted image by keeping 99% information of the cover image and 100% information of the secret image, thus it provides lossless retrieval of the secret image. The proposed work includes dynamicity of position in steganography that ensures more security of image data over the network than the existing state of art methods.

Authors and Affiliations

Unmesh Mandal, Diotima Nag, Goutam Das, Rimpi Saha

Keywords

Related Articles

A Review on Drinking Water Treatment with Disinfectant

The majority of the world's natural water sources are not always safe to consume untreated. Raw water from rivers, lakes, ponds, and groundwater can include microorganisms. Waterborne diseases can be contracted by consum...

Elevated Water Tank Design Comparison in Different Seismic Zones

Water is maintained in tall tanks as part of the public water system. Because of a shortage of water or difficulties putting out a fire after an earthquake, the collapse of these water tanks could pose major risks to peo...

Analysis of Bituminous Concrete Mixes Using H.D.P.E & Crumb Rubber as Admixtures

Flexible pavements need more attention in selection of Resources and preparation of mixes now a day’s temperature is the main criteria which affect the mix quality, strength and durability. Rapid changes in temperature n...

Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol

There is need to secure mobile phones locations by privacy frame work which utilizes K optimal principles. This improves the location position and tracking ability of Cell phones. Most of the time quality of service cann...

Using Wireless Sensor and Laser Technique to increase Production

IoT, or the Internet of Things, refers to the network of physical objects, devices, vehicles, buildings, and other items that are embedded with sensors, software, and other technologies to collect and exchange data over...

Download PDF file
  • EP ID EP745050
  • DOI 10.55524/ijircst.2023.11.5.1
  • Views 43
  • Downloads 0

How To Cite

Unmesh Mandal, Diotima Nag, Goutam Das, Rimpi Saha (2023). A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding. International Journal of Innovative Research in Computer Science and Technology, 11(5), -. https://europub.co.uk/articles/-A-745050