International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Research Paper | Information Technology | Myanmar | Volume 2 Issue 1, January 2013


Message Embedding In PNG File Using LSB Steganographic Technique

Wai Wai Zin


Abstract: Many types of Internet-based applications have been used for centuries to be secure important information and data. In some case, the communication is necessary to be secret. Consequently, the security of information has become a fundamental issue. In this paper, an image steganographic technique is presented by combining cryptographic and steganographic techniques. This system uses LSB-based data embedding technique to hide the encrypted message. Before embedding the secret message, RC4 algorithm is also used for message encryption. In this system, BBS (Blum Blum Shub) Pseudo Random Number Generator is used for generating the random sequences and then the secret messages can be hidden in PNG image file by using random sequences. This system is intended to emphasis on digital applications, focusing on hiding information under PNG image file.


Keywords: Image Steganography, Data Hiding, LSB technique, RC4


Edition: Volume 2 Issue 1, January 2013,


Pages: 227 - 230


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Wai Wai Zin, "Message Embedding In PNG File Using LSB Steganographic Technique", International Journal of Science and Research (IJSR), Volume 2 Issue 1, January 2013, pp. 227-230, https://www.ijsr.net/get_abstract.php?paper_id=IJSR13010217

Similar Articles with Keyword 'Image Steganography'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J. [2]

Share this Article

Downloads: 113

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive | Neelesh Gupta | Meha Khare

Share this Article
Top