Fig 1 - uploaded by Fateha Khanam Bappee
Content may be subject to copyright.
Least Significant Bit (LSB) substitution procedure 

Least Significant Bit (LSB) substitution procedure 

Source publication
Article
Full-text available
Data security has become a cause of concern because of the electronic spying especially in the military, government and many sectors of communication fields. This paper investigates a representation forembedding secure data within an image based on substitution method which gives the scope of large amount of secret message hiding within digital ima...

Citations

... Steganography is one of the techniques used to safeguard data/information against unauthorized access. Steganography is a method of hiding confidential information in a cover file (Alam, 2016). The cover file may be text file, digital image, audio file or video file. ...
Article
Full-text available
Steganography is one of the security measures employed at file level to cover information in a carrier. The goal of steganography is to send a confidential message over a network in a way that intruders will not notice it. In steganography, the message is wrapped in an innocent carrier such as image, audio or video file. There are always bits tempering in the process and this changes the looks and appearance of the carrier. The more secret message is embedded in any cover file, the more random noise occurs. Secret message bits when embedded drastically modify the Red Green and Blue (RGB) components’ bits of the carrier, hence, the statistical properties and physical appearance of the carrier change and this draws the attention of intruders to suspect that confidential data is hidden there. This research introduced an improved method of least significant bit replacement to cover secret data using 24 bits bitmap image to handle random noise efficiently so that the Human Visual System (HVS) of intruders will not notice the secret communication. The research reviewed some previous related researches that aimed to reduce the effect of random noise and research gap is identified. The research implemented the new Modified Least Significant Bit Replacement (M-LSBR) method to fill the identified research gap. Five (5) experiments were conducted with 5 (five) varying dimension RGB images and the result gathered that the PSNR value, image quality and message capacity of the new method is better than those achieved by the previous methods, hence, the research gap is filled. Finally, conclusion was drawn and recommendation for future research was suggested.
... Fahim et al. [48] recommended noise filtering in the beginning prior to the implantation. Subsequently to obtain at acquiring point, automated repetition is used for inaccuracy discernment and amendment. ...
Article
Full-text available
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder.
... For secure transmission regarding data, encryption & majority of the data hiding might joined together over an absolute step. [8]Host picture also puzzle data would change In under spot stream. First encryptions of puzzle data Normal filtering will a chance to be used. ...
Article
Full-text available
Encryption is the technique by which we can encode the expected snippet of In Advanced Image Steganography the message is covered up in a picture such that the spectators can't figure that it is not an ordinary picture. These days security is an essential issue while transmitting a message. To start with we have scrambled the message to a picture which needs a secret key to be unscrambled. At that point we have shrouded that picture inside another picture by steganography approach. By this two level concealing we can guarantee more grounded security. We propose a novel approach for steganography using a reversible surface union. A surface union process resample's a more diminutive surface picture, which joins another surface picture with an equivalent close-by appearance and a subjective size. We work the surface union process into steganography to cover puzzle messages. Instead of using a present cover picture to cover messages, our figuring covers the source surface picture and embeds riddle messages through the method of surface mix. This empowers us to isolate the puzzle messages and source surface from a stego designed surface. Our approach offers three specific positive conditions. To begin with, our arrangement offers the embedding’s furthest reaches that is in respect to the measure of the stego surface picture. Second, a steganalytic figuring isn't presumably going to vanquish our steganographic approach. Third, the reversible limit gained from our arrangement gives convenience, which grants recovery of the source surface. Trial comes to fruition have affirmed that our proposed estimation can give distinctive amounts of embedding’s limits, make an apparently possible surface pictures, and recover the source surface.
... To increase the security of confidential data can be a combination between encryption technique and concealment technique , When someone tries to gain access to confidential data on him revealed concealment , If enable, it will face data is unregularly and this will remove doubt in existence of the hidden data . [1] [2] ...
Article
Full-text available
the encryption and concealment of important areas to maintain the confidentiality of data , Where the proposed method is working on the coordination between the confidential data and the cover image and that is through combining between the encryption process and the concealment process (Creating the appropriate environment to conceal confidential data encoded in a special way at specific locations According to certain conditions) , Where the proposed method is divided into three phases , First stage : converting confidential data to a binary system , And then dividing them to two matrices , 1's matrix that contains 1's with 0 between each frequent two groups from 1's , and 0's matrix that contains 0's with 1 between each frequent two groups from 0's. Second stage: converting the cover image to labeled image and thus determining the locations of pixels that its value 1 and the locations of pixels that its value 0 .Third stage : hiding 1's matrix and 0's matrix in the specific locations , And thus obtaining embedded image. Then sending the embedded image, And four keys (the start storage location, and length for 1's matrix. the start storage location, and length for 0's matrix) to the recipient to compare it with original image (unembedded image) for extracting the secret data. This method is characterized by flexibility where can be applied on image types and data of different, and the durability because the concealment locations be random semi. To illustrate the proposed method has been tested on the cover image of type the gray sacle , and textual data , also using the metrics (PSNR) and (MSE) To test the efficiency of the proposed method And that by using the language of MATLAB .
... The development of the image processing techniques and the fast growth in communication via the internet led to the ease of both exchange and access to data and information [1]. Besides the existence of the electronic spyware, the information security, content ownership and protection of copyrighted multimedia content has become the focus of attention especially in sectors of government, military and other fields [2]. ...
... Decompose the blue channel of the cover image to the first level of DWT decomposition, and add the first three watermarks to the (HL1, LH1, and HH1) subbands. let f(i,j) be the original cover image, w(i,j) is the watermark image, f'(i,j) is the watermarked image, and α is the watermark strength factor, the embedding is done according to the following equation: (2) Decompose the blue channel of the cover image again to the fourth level of DWT decomposition and add the final (fourth) watermark to (LL4) sub-band. By the same previous equation (2). ...
... let f(i,j) be the original cover image, w(i,j) is the watermark image, f'(i,j) is the watermarked image, and α is the watermark strength factor, the embedding is done according to the following equation: (2) Decompose the blue channel of the cover image again to the fourth level of DWT decomposition and add the final (fourth) watermark to (LL4) sub-band. By the same previous equation (2). Reconstruct the blue channel by applying the inverse wavelet transform (IDWT). ...
Conference Paper
Full-text available
Digital watermarks have recently emerged as a possible solution for protecting the copyright of digital materials, the work presented in this paper is concerned with the Discrete Wavelet Transform (DWT) based non-blind digital watermarking, and how the DWT is an efficient transform in the field of digital watermarking. In this work we used an optimum criteria that embeds four watermarks in more than one level of DWT in the same algorithm. The aim of this work is to keep the Correlation Coefficient (CC) between the original and the extracted watermark around the value of 0.9.
... The development of the image processing techniques and the fast growth in communication via the internet led to the ease of both exchange and access to data and information [1]. Besides the existence of the electronic spyware, the information security, content ownership and protection of copyrighted multimedia content has become the focus of attention especially in sectors of government, military and other fields [2]. ...
... Decompose the blue channel of the cover image to the first level of DWT decomposition, and add the first three watermarks to the (HL1, LH1, and HH1) subbands. let f(i,j) be the original cover image, w(i,j) is the watermark image, f'(i,j) is the watermarked image, and α is the watermark strength factor, the embedding is done according to the following equation: (2) Decompose the blue channel of the cover image again to the fourth level of DWT decomposition and add the final (fourth) watermark to (LL4) sub-band. By the same previous equation (2). ...
... let f(i,j) be the original cover image, w(i,j) is the watermark image, f'(i,j) is the watermarked image, and α is the watermark strength factor, the embedding is done according to the following equation: (2) Decompose the blue channel of the cover image again to the fourth level of DWT decomposition and add the final (fourth) watermark to (LL4) sub-band. By the same previous equation (2). Reconstruct the blue channel by applying the inverse wavelet transform (IDWT). ...
... In Fahim Irfan Alam et. al's paper [10] the authors suggest noise filtering in the beginning before embedding. After extraction at receiving end, ARQ (Automatic Repeat Request) is used for error detection & correction. ...
Article
Steganography derives from the Greek word steganos, meaning covered or secret, and graphy (writing or drawing). Steganography is a technology where modern data compression, information theory, spread spectrum, and cryptography technologies are brought together to satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used in steganography and to identify areas in which this technique can be applied, so that the human race can be benefited at large.