Abstract

Steganography is one of the secure techniques of protecting data inside a cover object. Images are the most popular cover objects for Steganography. It provides secret message between users. The current paper presents an enhanced Most Significant Bit (MSB) technique. In this paper, a Private Domains Approach (PDA) is proposed; each domain consists of RGB of a pixel of cover image. Bit No.5 is applied to store the secret information in light of the bit that achieved highest steganography rate and the less probability of error rate.Consequently, this technique is allowing an improved version of MSB technique based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR). The experimental results show that our schemes perform well in terms of image quality. Generally; MSB technique produced the best stego-image quality in this paper.

Highlights

  • Term of steganography is the method and technology of hiding data in approaches that prohibit revelation [3]

  • In [6] comparative study has been done between least significant bit (LSB) and Most Significant Bit (MSB) technique and use gray-scale stego-image

  • Insertion process of secret message is done in Least Significant Bit (LSB) or Most Significant Bit (MSB) of the image pixels

Read more

Summary

Introduction

Term of steganography is the method and technology of hiding data in approaches that prohibit revelation [3]. Lid file in which data that hidden is: image, audio or video file, stego is merging of concept of secret data and lid file. The process of hiding includes the original file (cover) to secure stream data, is hidden, secret data, and password is a key for stego process. The original file and the secret data are called the stego object. The approach of steganography image is one of the exceedingly accepted data hiding. A superior data-hiding technique need to be protecting from statistical and visible detection with providing secret message [2]. In this paper used image file as a cover to stego the secret information. This paper is organized as: Section II displays approaches of image steganography.

Background and related work
Approaches of Steganography
Proposed Approach
The Performance Evaluation
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call