Implementation of Lsb Steganography and Its Evaluation for Various File Formats

Topics: Portable Network Graphics, Graphics Interchange Format, JPEG Pages: 9 (3275 words) Published: November 26, 2011
Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011)


Implementation of LSB Steganography and its Evaluation for Various File Formats V. Lokeswara Reddy Department of CSE, K.S.R.M. College of Engg., Kadapa, A.P. India Email: Dr. A. Subramanyam Dept. of CSE, AITS, Rajampet, Y.S.R.(Kadapa) Dist.. A.P. Dr.P. Chenna Reddy Dept. of CSE, JNTUCE, Pulivendula, Y.S.R.(Kadapa) Dist.. A.P. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Steganography is derived from the Greek word steganos which literally means “Covered” and graphy means “Writing”, i.e. covered writing. Steganography refers to the science of “invisible” communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB Embedding technique and Presents the evaluation for various file formats. Keywords: Steganography, Least Significant Bit (LSB), GIF, PNG, BMP.

--------------------------------------------------------------------------------------------------------------------Date of Submission: 24, August 2010 Date of Acceptance: 08 November 2010 are transferred through unknown cover carriers in such a manner that the very existence of the embedded messages is undetectable. Carriers include images; audio, video, text or any other digitally represented code or transmission. The hidden message may be plaintext, cipher text or anything that can be represented as a bit stream. II. IMAGE STEGANOGRAPHY Image compression techniques are extensively used in steganography. Among the two types of image compressions, lossy compression and loss less compression; lossless compression formats offer more promises. Lossy compression compression may not maintain the original image’s integrity. Lossless compression maintains the original image data exactly, hence it is prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless compression formats are GIF[3] and BMP formats. We have used an 8-bit image size for implementation of our steganography. Improvement in stegnographic techniques is make it possible to apply the Detecting LSB Steganography in Colour and Gray- Scale Images which were confined to gray scale images in the initial stages The difficulty in colour images control is solved later on in many techniques such as the analysis of the variation of the gradient energy. The secret message embedded in the target image is detected in both gray and colour images, and the length of the embedded message is estimated [5, 6].

--------------------------------------------------------------------------------------------------------------------I. INTRODUCTION

Digital content is now posing formidable challenges to
content developers, aggregators, distributors and users. The destruction, extraction or modification of the embedded message is required to develop more robust systems so that the digital content processing and organization becomes easy. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. The shift from cryptography to stegnography is due to that concealing the image...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • File Formats Essay
  • Steganography Essay
  • Essay about Steganography
  • comonly used file formats Essay
  • Steganography Essay
  • Steganography Essay
  • Steganography Essay
  • Essay about Steganography

Become a StudyMode Member

Sign Up - It's Free