Steganography Scheme Based on LSB Embedding Technique with Different Image Format
Journal Title: International Journal of engineering Research and Applications - Year 2018, Vol 8, Issue 6
Abstract
To increase the security of messages sent over internet steganography is used. Various steganography techniques have been proposed so far. Least Significant Bit steganography is one such technique in which least significant bit of pixels of the image is replaced with data bits. This approach has the advantage that it is simplest one to understand, easy to implement and results in stego-images that contain embedded data as hidden. The disadvantage of Least Significant Bit is that it is vulnerable to stego analysis and is not secure at all. So as to make it more secure, the least significant bit algorithm is modified to work in different way. The proposed method performs a selection of suitable direction for secret byte embedding so as to minimize the bit changes in the cover image when a secret data is embedded. This paper reports a new algorithm for LSB (Least Significant Bit) replacement based image steganography for RGB color images. The directional aspects of embedding data are explored to develop an improved LSB embedding technique.
Authors and Affiliations
Mrs. Aparna Singh Kushwah, Ruchika Daharwal
Textiles for protection against Electromagnetic Radiations: A review
Increased use of electronic devices creates a need to protect a present generation from the harmful effects of electromagnetic radiations. This review paper discuss about different textile materials that have been explor...
Comparison of R.C.C. And Composite Multistoried Buildings
Steel concrete composite construction has gained wide acceptance world wide as an alternative to pure steel and pure concrete construction. The use of steel in construction industry is very low in India compared to many...
Evaluation Of Bituminous Mix Parameters With Addition Of Plastic Waste
Road construction is the main integral part of the developing countries. The conventional method has been proven perfect for the road construction but now, time has come where there is a need of enhancement of properties...
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain...
Evaluation of Volumetric Concentration of Ferrofluid Useful For Heat Extraction in High Power Transformers
In conventional method, transformer oil is used as a coolant under natural convection. Transformer oils have low cooling efficiency due to low thermal conductivity. This work proposes the use of ferrofluid with transform...