International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016


A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach

Raminder Jit Singh Kahlon | Vinay Bhardwaj [2]


Abstract: Steganography is a technique for the secure transmission of data over the network. In this process, the secret information is transmitted by hiding this behind a signal or image or video. Steganography can be a solution which makes it possible to send news and information without being censored and without the fear of the messages being intercepted and traced back to us. In this process, the secret information is transmitted by hiding this behind a signal or image or video. This technique can be used for hiding images in 24-bit, 8-bit or gray scale format. There is a limit to the size of a file which you can embed information into. There is no provision for encryption in Least Significant Bit (LSB). The main motivation behind the work is that to make LSB more detectable and more secure and also the data that is sent behind the image is in more quantity.


Keywords: Stegnography, Image Stegnography, LSB, MLSB, Security, Data Hiding


Edition: Volume 5 Issue 7, July 2016,


Pages: 408 - 412


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Raminder Jit Singh Kahlon, Vinay Bhardwaj, "A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach", International Journal of Science and Research (IJSR), Volume 5 Issue 7, July 2016, pp. 408-412, https://www.ijsr.net/get_abstract.php?paper_id=ART2016165

Similar Articles with Keyword 'Stegnography'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar | Vijay Kumar Sharma [2]

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary [2] | Kumar Vaibhav

Share this Article
Top