A Review on “Image Steganography with LSB & DWT Techniques”
Neha 1 , Mr Mohit2
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-9 , Page no. 813-818, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.813818
Online published on Sep 30, 2018
Copyright © Neha, Mr Mohit . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Neha, Mr Mohit, “A Review on “Image Steganography with LSB & DWT Techniques”,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.813-818, 2018.
MLA Style Citation: Neha, Mr Mohit "A Review on “Image Steganography with LSB & DWT Techniques”." International Journal of Computer Sciences and Engineering 6.9 (2018): 813-818.
APA Style Citation: Neha, Mr Mohit, (2018). A Review on “Image Steganography with LSB & DWT Techniques”. International Journal of Computer Sciences and Engineering, 6(9), 813-818.
BibTex Style Citation:
@article{Mohit_2018,
author = {Neha, Mr Mohit},
title = {A Review on “Image Steganography with LSB & DWT Techniques”},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {813-818},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2949},
doi = {https://doi.org/10.26438/ijcse/v6i9.813818}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.813818}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2949
TI - A Review on “Image Steganography with LSB & DWT Techniques”
T2 - International Journal of Computer Sciences and Engineering
AU - Neha, Mr Mohit
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 813-818
IS - 9
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
502 | 313 downloads | 337 downloads |
Abstract
In all the fields of steganography such as image, text, audio, video there are many techniques used totransfer the secret messages without known to other person. Using the Steganography technique to hide the data or message in an image,LSB and DWT are two easy techniques which are usefull and implemented easily to improve robustness and performance of algorithms. LSB method used to transfer the large data and replace some information in pixel with information from the data in image. Overall use of LSB doesn’t affect the representation of image. In this technique, LSB method will be used to transfer the large data and replace some information in pixel with information from the data in an image.DWT method is used to embed converted data into cover medium to conceal its presence. For the security, we will use the technique DWT which is used with the low frequency (used for narrow bandwidths) and high frequencies (for wider bandwidths) and for the flexibility.
Key-Words / Index Term
Steganography, Least-significant-bit (LSB), Discrete Wavelet Transform(DWT)
References
[1]Er. MunishKatoch and ReenuJaswal, " Image Steganography: A Review," International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2016.
[2]K.Dhinesh, K.Meenachi, A.Selvabharathi, S.Senthamilselvan, “An ImprovedLSB Based Steganography Technique for Grayscale and Color Images,” International Journal of Advanced Research in Electronic and Communication Engineering, Vol. 5, Issue 4, April 2016.
[3]L.Baby Victoria, “A Study on Spatil Domain and Transform Domain Steganography Techniques used in Image Hiding,” International Journal of Innovative Technology and Creative Engineering, Vol.5 No.5 May 2015.
[4]Sukhjinder Singh, KulbhushanSingla, Dr. Rahul Malhohtra, “A Robust Image Steganography Technique using Quantized Range Table and Local Area Pixel Value Differencing,” International Journal of Advanced Research in Electronic and Communication Engineering, Vol. 5, Issue 2, February 2016.
[5]S.Thenmozhi, M.Chandrasekaran, “Multilayered, High Capacity, Distortionless Image Steganogaphy using ANN,” South Asian Journal and Technology, Vol.2,No.21 pp.63- 73, 2016.
[6]Mamta Jain and Saroj Kumar Lenka, “A Review on Data Leakage Prevention using Image Steganography,” Mamta Jain et al./ International Journal of Computer Science Engineering, Vol.5, No.002, Mar 2016.
[7]S.Krishnan, M.S. Abdullah, “Enhanced Security Audio Steganography by Using Higher Least Significant Bit,” Journal of Advanced Research in Computing and Applications ISSN(ONLINE), Vol.2,No.1.pp.39-54, 2016.
[8]Ms.Kajal Prakash kamble, Ms SwapnaliVasantKhabale, Mr. AnkushShahu Morale, “An Infallible Method to Transfer Confidential Data using Delta Steganography,”International Research Journal of Engineering and Technology, Vol.03, Issue:02, Feb-2016.
[9]Komal Kapoor, “Digital Image Steganography based Security Model using Wavelet for Internet Voting Environment,” International Journal of Advanced Research in Electronics and Communication Engineering, Volume 5, Issue 2, February 2016.
[10] Ashley S.Kelsey, CajetanM.Akujuobi, “ A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography,” International Journal of Cyber-Security and Digital Forensics(IJCSDF) 5(1):10-20,The Society of Digital Information and Wireless Communications, 2016 (ISSN:2305-0012).
[11]DeepakGarg, Gourav Sharma, “Applications of Steganography in Information Hiding,” International Journal of Advanced Research in Education Technology, Vol.3, Issue 1, Jan-Mar. 2016.
[12]MsVedantiM.Khandare, Dr. SiddharthA.Ladhake,Mr.U.S.Ghate, “An Approach of ECG Steganography to Secure the Patient’s Confidential Information,” International Research Journal of Engineering and Technology, Volume: 03, Issue: 03| Mar-2016.
[13]Sumanth C, Dr. M B Meenavathi, “Audio-Video Steganography using Face Recognition Technique for Authentication,” International Journal of Advanced Research in Electronics and Communication Engineering, Volume 5, Issue 5, May 2016.
[14] Md. Mizanur Rahman, Pronab Kumar Mondal, Indrani Mandal, Habiba Sultana, “Secure RGB Image Steganography Based on Triple-A Algorithm and Pixel Intensisty,” International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March- 2016.
[15]Seema S. Girare, Malvika U. Saraf, “Literature Review on Different Watermarking & Steganography Technique,” International Research Journal of Engineering and Technology, Volume: 03, Issue: 04| Apr-2016.
[16] Don Caeiro and Sanjana S, “Detection of Steganography Using Metadata in JPEG Files,” The International Journal of FORENSIC COMPUTER SCIENCE( www.IJoFCS.org),2015.
[17]SaurabhPaliwal, “ A Surve& Applications of Various Image Steganography Techniques,” International Journal of Scientific & Engineering Research, Volume 7, Issue 1, January-2016.
[18]RiyadhBassilAbduljabbar, “ Steganography System using Slantlet Transform,” Journal of Information, Communication, and Intelligence Systems(JICIS), Volume 2, Issue 1, February2016.
[19]Hamad A. Al- Korbi, Ali Al- Ataby, Majid A.Al-Taee and Waleed Al-Nuaimy, “ Highly Efficient Image Steganography Using Haar DWT for Hiding Miscellaneous Data,” Jordanian Journal of Computers and Information Technology (JJCIT), Vol.2,No. 1,April 2016.
[20] Mamta Jain and Saroj Kumar Lenka, “ A Review of Digital Image Steganography Using LSB and LSB Array,” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 3(2016).
[21] Mr. Mohit “An Enhanced Least Significant Bit Steganography Technique,” International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) Volume 5, Issue 6, June 2016.
[22]G. Raj Kumar, M. MaruthiPrasada Reddy, T. LalithKumar,“An Implementation of LSB Steganography Using DWT Technique,” International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November,2014.
[23]Juned Ahmed Mazumder, KattamanchiHemachandran, “Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method,” International Journal of Computer Sciences and Engineering, Volume-2, Issue-7, July 2014.
[24]Vanitha T, Anjalin D Souza, Rashmi B, SweetaDSouza, “ A Review on Steganography- Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm,” International Journal of Innovative Research in Computer and Communication Engineering Vol.2, Special Issue 5, October 2014.
[25]M Abhilash Reddy, P. Sanjeeva Reddy, GS Naveen Kumar, “DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO,” International Journal of Engineering Science & Advanced Technology Volume-3, Issue-4, Aug-Sep 2013.
[26]KalpanaShete, MangalPatil, J.S. Morbale “FPGA Implementation of Image Steganography Using LSB & DWT,” International Journal of Computer Science and Network, Volume 4, Issue 6, December 2015.
[27] Kalpana Sanjay Shete, MangalPatil and J.S. Chitoda, “Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA,” I. J. Image, Graphics and Signal Processing Vol.6, June 2016.
[28]StutiGoel, ArunRana&Manpreet Kaur, “ A Review of Comparison Techniques of Image Steganography,” Global Journal of Computer Science & Technology Graphics & VisionVolume-13, Issue-4 Version 1.0, 2013.
[29]Manisha and DeepkiranMunjal, “Dual Steganography Technique Using Status LSB and DWT Algorithms,” International Journal of Innovative Research in Computer and Communication Engineering, Volume 4, Issue 6, June 2016.