Open Access   Article Go Back

Comparative Study of Multibit LSB Steganography with Cryptography

Mandeep Kaur Gill1 , Rupinder Kaur Randhawa2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-7 , Page no. 120-123, Jul-2015

Online published on Jul 30, 2015

Copyright © Mandeep Kaur Gill , Rupinder Kaur Randhawa . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mandeep Kaur Gill , Rupinder Kaur Randhawa , “Comparative Study of Multibit LSB Steganography with Cryptography,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.120-123, 2015.

MLA Style Citation: Mandeep Kaur Gill , Rupinder Kaur Randhawa "Comparative Study of Multibit LSB Steganography with Cryptography." International Journal of Computer Sciences and Engineering 3.7 (2015): 120-123.

APA Style Citation: Mandeep Kaur Gill , Rupinder Kaur Randhawa , (2015). Comparative Study of Multibit LSB Steganography with Cryptography. International Journal of Computer Sciences and Engineering, 3(7), 120-123.

BibTex Style Citation:
@article{Gill_2015,
author = {Mandeep Kaur Gill , Rupinder Kaur Randhawa },
title = {Comparative Study of Multibit LSB Steganography with Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {120-123},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=586},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=586
TI - Comparative Study of Multibit LSB Steganography with Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Mandeep Kaur Gill , Rupinder Kaur Randhawa
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 120-123
IS - 7
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2360 2385 downloads 2495 downloads
  
  
           

Abstract

Security has an important role in data communication through internet. When data travel through public network, sometimes unaccredited users access the confidential data. For secure communication various techniques are used from ancient time to the present time. Steganography is such type of technique used for data transmitting through insecure network. It is an art of hiding information inside other cover media such as text, image, audio and video. Various types of Steganography techniques are Text Steganography, Image Steganography, Audio and Video Steganography. But from these, Image Steganography is more usable due to increased frequency of images on the internet. Cryptography is a technique used for encrypting the plain text into cipher text securing from hackers. Cryptography is disparate from Steganography. In Cryptography, data is converted into different form of data. But in Steganography, data are invisible inside other data. In Cryptography, third party knows the presence of the secret message. In Steganography, unauthorized users do not know about the presence of the secret message. Hence, amalgamation of Steganography and Cryptography gives meticulous results. This paper instigates comparative study of pure LSB Steganography and LSB Steganography with Cryptography. One bit and two bits LSB steganography is implemented. Data are encrypted using RSA algorithm. Proposed technique is used to compare results of MSE (mean square error), RMSE (root mean square error), PSNR (peak signal to noise ratio) and NC (normalized coefficient) for both techniques.

Key-Words / Index Term

LSB, Cryptography, Steganography, RSA, PSNR, MSE, NC

References

[1] V Tyagi, A Kumar, R Patel, S Tyagi and S Singh Gangwar, “IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY”, Journal of Global Research in Computer Science, Volume-03, No-03, Page No (53-55), March 2012.
[2] S Gupta, A Goyal and B Bhushan, “Information Hiding Using Least Significant Bit Steganography and Cryptography”, I.J.Modern Education and Computer Science, Page No (27-34), June 2012.
[3] A Kumar and R Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, Int. Journal of Advanced Research in Computer Science and Software Engineering, Volume-03, Issue-07, July 2013.
[4] R Patel and D Shah “Multiple LSB data hiding based on Pixel value and MSB value”, Nirma University International Conference on Engineering, ISBN: 978-1-4799-0727-4, Page No (1-5), 2013.
[5] K Thangadurai and G Devi, “An analysis of LSB Based Image Steganography Techniques”, Int. Conference on Computer Communication and Informatics, ISBN: 978-1-4799-2352-6, Jan 03 – 05, 2014.
[6] S Patil, P Bhendwad and R Patil, “Steganographic Secure Data Communication”, Int. Conference on Communication and Signal Processing, ISBN: 978-1-4799-3358-7, Page No (953-956), April 03-05, 2014.
[7] G Seivi, L Mariadhasan and K Shunmuganathan, “Steganography Using Edge Adaptive Image”, Int. Conference on Computing, Electronics and Electrical Technologies, ISBN: 978-1-4673-0210-4, Page No (1023-1027), 2012.
[8] M Ramaiya, N Hemrajani and A Saxena, “Improvisation of Security aspect in Steganography applying DES”, Int. Conference on Communication Systems and Network Technologies, ISBN: 978-0-7695-4958-3, Page No (431-436), 2013.
[9] S Nagar and S Alshamma, “High Speed Implementation of RSA Algorithm with Modified Keys Exchange”, Int. Conference on Sciences of Electronics, Technologies of Information and Telecommunications, ISBN: 978-1-4673-1658-3, Page No (639-642), 2012.
[10] N Akhtar, P Johri and S Khan, “Enhancing the Security and Quality of LSB based Image Steganography”, Int. Conference on Computational Intelligence and Communication Networks, Page No (386-390), 2013.