Abstract

Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.

Highlights

  • A Review Study on Unique Way of Information HidingFaculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan

  • The communication arrangement has made so many things easy in the daily life, where use of internet become a business and need of internet is growing by passing of the day

  • Secrete key steganography: Secret Key Steganography is the best technique of Steganography because it is much secure than other little bit better than before, because a secret key is used with embedding stage where as if a third person can interfere or get access to stego-image he/she can never get rollback the process because it is require a secrete key

Read more

Summary

A Review Study on Unique Way of Information Hiding

Faculty of Computer Science & Information Technology, Virtual University of Pakistan, Lahore, Pakistan. To cite this article: Muhammad Zeeshan, Sibghat Ullah, Saadia Anayat, Rabia Ghulam Hussain, Nayab Nasir. A Review Study on Unique Way of Information Hiding: Steganography. International Journal on Data Science and Technology. Received: July 19, 2017; Accepted: August 17, 2017; Published: September 26, 2017

Introduction
Related Work
Secrete key steganography
Steganography – The Approach to Work
Lossy Compression
Algorithms Used for Steganography
Masking and Filtering
Algorithm Complexity
Time Complexity
Variable Depth LSB Data Hiding
One LSB Replacement
Capacity
Three LSB Replacement
Four LSB Replacement
Cycling of Colour
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call