Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

The information hiding techniques arose to satisfy the need for covert communication. Steganography is an extremely useful method for covert information transmission. Steganography is the data hiding technique which allows hiding secret message or image within a larger image or message such that the hidden message or an image is undetectable. This paper proposes an image hiding steganographic method, of hiding an image within a cover image. This steganographic method aims to minimize the visually apparent and statistical differences between the cover image and a stego image with increase in the size of the payload. The proposed algorithm uses the binary codes which is the binary representation of pixels inside the image. This algorithm make use of least significant bit (LSB) technique, which is a popular technique in steganography, in which least significant bits of cover are altered by secret data bits. The proposed method incorporate randomization algorithm which improve the security of LSB scheme. The bits of the secret image are embedded in random pixels of the cover image and these random pixels are generated by RC4 algorithm. The system enhances the security of the LSB technique by randomly dispersing the bits of secret image in the cover image which makes it harder for unauthorized people to extract the original image. Since all the secret image bits are embedded in the cover image the exact secret image can be regenerated from the stego-image and thereby the image quality is preserved by the system. Thus the proposed system implements steganography for images, with an improvement in both security and image quality.

Keywords: Data hiding, Steganography, LSB encoding, Image Steganography, Randomization, RC4 Algorithm

Edition: Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Share this Article

How to Cite this Article?

Mekha Jose, "Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14620, Volume 3 Issue 9, September 2014, 2281 - 2284

146 PDF Views | 116 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data hiding'

| Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

| Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Similar Articles with Keyword 'Image Steganography'

| Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this Article

Similar Articles with Keyword 'Randomization'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

| Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3127 - 3134

A Survey of Random Decision Tree Framework Privacy Preserving Data Mining

Vina M. Lomte, Hemlata B. Deorukhakar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1758 - 1762

Privacy-Preserving Data Mining using RDT Framework and C4.5

Komal N. Chouragade, Trupti H. Gurav

Share this Article

| Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2068 - 2071

Bottom-Up Generalization: A Data Mining Solution to Privacy Protection

Vishakha B. Dalvi, Ranjit R. Keole

Share this Article

Similar Articles with Keyword 'RC4 Algorithm'

| Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1925 - 1927

Survey on Secured Association Rule Mining in Partitioned Database

Gurpreet Kaur Bhatti, Prof. Ravi Patki

Share this Article

| Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this Article
Top