Browse > Article
http://dx.doi.org/10.9723/jksiis.2015.20.3.029

A Study of Optimal Image Steganography based on LSB Techniques  

Ji, Seon-Su (강릉원주대학교 정보기술공학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.20, no.3, 2015 , pp. 29-36 More about this Journal
Abstract
Steganography is the technique of hiding the existence of a secret message that is communicated hiddenly. Generally, the main objectives of this paper is to develop newer and more sophisticated steganographic techniques based on perceptual transparency, robustness and capacity of the hidden data. This paper analyzes the advantages and disadvantages of image steganography techniques and proposes an effective method. As a result, the images steganography technique based on good ELSB and DCT which applies the rearranged key is secure and effective.
Keywords
Data Hiding; Image Steganography; Least Significant Bit(LSB); Steganalysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. S. Ji, "Advanced LSB Technique for Hiding Messages in Audio Steganography", KIISC, Vol 17, No. 5, pp. 37-42, 2014. (journal)
2 Ruchi Jain, "An Extensive Survey on Image Steganography", International Journal of Emerging Technology and Advanced Engineering, Vol 4, Issue 3, pp. 674-679, 2014. (journal)
3 Kanzariya Nitin K. and Nimavat Ashish V., "Comparison of Various Images Steganography Techniques", International Journal of Computer Science and Management Research, Vol 2, Issue 1, pp. 1213-1217, 2013. (journal)
4 S. Sharda and S. Budhiraja, "Image Steganography : A Review", International Journal of Emerging Technology and Advanced Engineering, Vol 3, Issue 1, pp. 707-710, 2013. (journal)
5 Sandeep Singh and Aman Singh. "A Review on the Various Recent Steganography Techniques", International Journal of Computer Science and Network, Vol 2, Issue 6, pp. 142-156, 2013. (journal)
6 Suvarna Patil and Gajendra Singh Chandel, "Literature Survey on DWT Based Image Steganography", International Journal of Computer Science and Mobile Computing, Vol 3, Issue 2, pp. 904-909, 2014. (journal)
7 Mehdi Hussain and Mureed Hussain, "A Survey of Image Steganography Techniques", International Journal of Advanced Science and Technology, Vol 54, pp.113-123, 2013. (journal)
8 Stuti Goel, Arun Rana and Manpreet Kaur, "A Review of Comparison Techniques of Image Steganography", Journal of Electrical and Electronics Engineering, Vol 6, Issue 1, pp. 41-48, 2013. (journal)
9 K. N. BrahmaTeja, G. L. Madhumati and K. R. Koteswara Rao, "Data Hiding Using EDGE Based Steganography", International Journal of Emerging Technology and Advanced Engineering, Vol 2, Issue 11, pp. 285-290, 2012. (journal)
10 Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, "Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm", International Journal of Computer and Electrical Engineering, Vol 4, No. 4, pp. 458-462, 2012. (journal)
11 J. R. Smith and B.O. Comisky. Modulation and information hiding in images. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture notes in Computer Science, pp. 207-226. Springer-Verlag, Berlin, 1996.