Steganography System Using More Lsbs

Autori

  • Veselka T. Stoyanova National Military University, Faculty of Artillery, AAD and KIS, Shumen, Bulgaria

Ključne reči:

steganography, cover image, data hiding, stego image, LSB

Apstrakt

Steganography is the method of hiding message in a cover object for cover communication. The article deals with the steganography system which hides text inside images without losing of data (BMP, PNG, TIFF and GIF). The secret message is hidden in the cover image using Last Significant Bit (LSB) method. Paper presents functionalities of the developing software, using LBS methods. Visual and statistical analysis of LBS method indicate the good results of its application.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Reference

Arganovskiy, A. V., Balakin, A. V., Gribunin, V. G., Sapozhnikov, S. A. (2009, Steganografiya, tsifrovyye vodyanyye znaki i steganoanaliz (Steganography, digital watermarks and steganoanalysis), Vuzovskaya kniga, Moscow.

Cole, E. (2003), Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley Publishing, Inc., Indianapolis, Indiana.

Cox, I. J., Miller, M. L., Bloom, J.A., Kalker, T., Fridrich, J. (2008), Digital watermarking and steganography. Second Edition, Elsevier Inc., Burlington, MA, USA.

Genne, O. V. (2000), “The Main Provisions of Steganography”, Journal “Information Security. Confident”, Vol. 3, pp. 20-25.

Gribunin, V. G., Okov, I. N., Turintsev, I. V. (2002), Tsifrovaya steganografiya (Digital steganography), Solon-Press, Moscow.

Johnson, N. F., Jajodia, S. (1998), “Exploring steganography: Seeing the unseen”, Computer, Vol. 31, No. 2, pp. 26-34.

Judge, J. C. (2001), Steganography: Past, present, future, Lawrence Livermore National Lab., CA, USA.

Koduri, N. (2012), Information Security through Image Steganography using Least Significant Bit Algorithm, Master’s Thesis, Information Security and Computer Forensics, University of East London.

Provos, N., Honeyman, P. (2003), “Hide and seek: An introduction to steganography”, IEEE Security & Privacy, Vol. 99, No. 3, pp. 32-44.

Tasheva, А. (2011), “Izsledvane kharakteristikite na steganografski algoritŭm pri razlichni stepeni na zashtita” (Investigation of the characteristics of a steganographic algorithm at different degrees of protection), Sbornik s dokladi „VII Natsionalna student·ska nauchno-tekhnicheska konferentsiya 2011”, Tekhnicheski universitet – Sofiya, str. 157-162.

##submission.downloads##

Objavljeno

2018-10-31

Broj časopisa

Sekcija

Industrial Organization