Abstract
Steganography - the art and technique of hiding information in images, audio, video or text and other cover media has evolved and developed with time. Numerous improvements have been achieved with respect to security, robustness and capacity. This paper presents a review of different LSB embedding techniques in Spatial Domain for image steganography. A variety of techniques which have evolved over time and have improved the basic LSB technique have been discussed. These techniques have also been compared on the basis of different parameters.
Highlights
Internet penetration has caused an explosive growth in the digital content exchange between various users
Aryabhatta Group of Institutes, Barnala, India of the digital content is enforced using Digital Watermarking and Cryptography. Both of these techniques are different from Steganography, which attempts to hide some information in the digital content in such a way that the media carrying the secret message looks naïve
Min-Hui Lin et al [17] proposed A Novel Information Hiding Scheme Based on Block Truncation Coding (BTC).This technique embeds a binary image into the compression domain of a host image
Summary
Internet penetration has caused an explosive growth in the digital content exchange between various users. Aryabhatta Group of Institutes, Barnala, India of the digital content is enforced using Digital Watermarking and Cryptography Both of these techniques are different from Steganography, which attempts to hide some information in the digital content in such a way that the media carrying the secret message looks naïve. Different algorithms would insert the binary form of the secret data in 1, 2, 3 or 4-LSBs of the cover image. LSB replacement steganography is a famous effective method which substitutes the least significant bits of the cover image for the secret bits [1]. Data hiding using LSB replacement is the simplest, convenient method which offers the advantage of being visually imperceptible to human eye and enhanced carrying capacity of the cover image. Different researchers proposed various ways to improve upon these constraints, the important ones being discussed below
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.