Least Significant Bit Gaped: A New Method for Image Steganography

Least Significant Bit Gaped: A New Method for Image Steganography

Abstract - Steganography is an information security technique that provides a solution for hiding information. There are different

___

  • References [1] R. J. Anderson and F. A. P. Petitcolas, "On the Limits of Steganography," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474 - 481, 1998. [2] Petitcolas, F. A. P. R. J. Anderson and M. G. Kuhn, "Information Hiding - A Survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062 - 1078, 1999. [3] L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread Spectrum Image Steganography," IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075 - 1083, 1999. [4] N. Nikolaidis and I. Pitas, "Digital Image Watermarking: an Overview," in Proceedings IEEE International Conference on Multimedia Computing and Systems, 1999. [5] N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE, Computer , vol. 31, no. 2, pp. 313 - 336, 1998. [6] W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3.4, pp. 313 - 336, 1996. [7] G. L. Smitha and E. Baburaj, "A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm," in International Conference on Emerging Technological Trends (ICETT) , 2016. [8] T. Shelare and V. Powar, "A Secure Data Transmission Approach Using B+trees In Steganography," in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016. [9] J. Kumar, "A Novel Approach to Image Steganography using Quadtree Partition," in 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016. [10] A. Abuadbba and I. Khalil, "Walsh-Hadamard Based 3D Steganography for Protecting Sensitive Information in Point-of-Care," IEEE Transactions on Biomedical Engineering, vol. 64, no. 9, pp. 2186 - 2195, 2017. [11] V. Sharon, B. Karthikeyan, S. Chakravarthy and V. Vaithiyanathan, "Stego Pi : An Automated Security Module for Text and Image Steganography using Raspberry Pi," in International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2016. [12] A. A. J. Altaay, S. b. Sahib and M. Zamani, "An Introduction to Image Steganography Techniques," in International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012. [13] M. Kude and M. Borse, "Skintone Detection Based Steganography Using Wavelet Transform," in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016. [14] J. Fridrich, M. Goljan and R. Du, "Detecting LSB Steganography in Color and Gray-Scale Images," IEEE MultiMedia, vol. 8, no. 4, pp. 22 - 28, 2001.