Comparative Study of Multibit LSB Steganography with Cryptography
Keywords:
LSB, Cryptography, Steganography, RSA, PSNR, MSE, NCAbstract
Security has an important role in data communication through internet. When data travel through public network, sometimes unaccredited users access the confidential data. For secure communication various techniques are used from ancient time to the present time. Steganography is such type of technique used for data transmitting through insecure network. It is an art of hiding information inside other cover media such as text, image, audio and video. Various types of Steganography techniques are Text Steganography, Image Steganography, Audio and Video Steganography. But from these, Image Steganography is more usable due to increased frequency of images on the internet. Cryptography is a technique used for encrypting the plain text into cipher text securing from hackers. Cryptography is disparate from Steganography. In Cryptography, data is converted into different form of data. But in Steganography, data are invisible inside other data. In Cryptography, third party knows the presence of the secret message. In Steganography, unauthorized users do not know about the presence of the secret message. Hence, amalgamation of Steganography and Cryptography gives meticulous results. This paper instigates comparative study of pure LSB Steganography and LSB Steganography with Cryptography. One bit and two bits LSB steganography is implemented. Data are encrypted using RSA algorithm. Proposed technique is used to compare results of MSE (mean square error), RMSE (root mean square error), PSNR (peak signal to noise ratio) and NC (normalized coefficient) for both techniques.
References
V Tyagi, A Kumar, R Patel, S Tyagi and S Singh Gangwar, “IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY”, Journal of Global Research in Computer Science, Volume-03, No-03, Page No (53-55), March 2012.
S Gupta, A Goyal and B Bhushan, “Information Hiding Using Least Significant Bit Steganography and Cryptography”, I.J.Modern Education and Computer Science, Page No (27-34), June 2012.
A Kumar and R Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, Int. Journal of Advanced Research in Computer Science and Software Engineering, Volume-03, Issue-07, July 2013.
R Patel and D Shah “Multiple LSB data hiding based on Pixel value and MSB value”, Nirma University International Conference on Engineering, ISBN: 978-1-4799-0727-4, Page No (1-5), 2013.
K Thangadurai and G Devi, “An analysis of LSB Based Image Steganography Techniques”, Int. Conference on Computer Communication and Informatics, ISBN: 978-1-4799-2352-6, Jan 03 – 05, 2014.
S Patil, P Bhendwad and R Patil, “Steganographic Secure Data Communication”, Int. Conference on Communication and Signal Processing, ISBN: 978-1-4799-3358-7, Page No (953-956), April 03-05, 2014.
G Seivi, L Mariadhasan and K Shunmuganathan, “Steganography Using Edge Adaptive Image”, Int. Conference on Computing, Electronics and Electrical Technologies, ISBN: 978-1-4673-0210-4, Page No (1023-1027), 2012.
M Ramaiya, N Hemrajani and A Saxena, “Improvisation of Security aspect in Steganography applying DES”, Int. Conference on Communication Systems and Network Technologies, ISBN: 978-0-7695-4958-3, Page No (431-436), 2013.
S Nagar and S Alshamma, “High Speed Implementation of RSA Algorithm with Modified Keys Exchange”, Int. Conference on Sciences of Electronics, Technologies of Information and Telecommunications, ISBN: 978-1-4673-1658-3, Page No (639-642), 2012.
N Akhtar, P Johri and S Khan, “Enhancing the Security and Quality of LSB based Image Steganography”, Int. Conference on Computational Intelligence and Communication Networks, Page No (386-390), 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
