This paper is published in Volume-5, Issue-2, 2019
Area
Steganography
Author
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon
Org/Univ
Ramgarhia Institute of Engineering and Technology, Phagwara, Punjab, India
Keywords
Steganography, LSB, Random-key, Image, Secret message, Stego-key, Cover image, Techniques
Citations
IEEE
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon. Digital image steganography using LSB and pseudo-random technique, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon (2019). Digital image steganography using LSB and pseudo-random technique. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon. "Digital image steganography using LSB and pseudo-random technique." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon. Digital image steganography using LSB and pseudo-random technique, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon (2019). Digital image steganography using LSB and pseudo-random technique. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
Naveen Kalia, Manit Kapoor, Dr. Naveen Dhillon. "Digital image steganography using LSB and pseudo-random technique." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Abstract
This paper purposed an image based steganography that uses the Least Significant Bits (LSB) techniques and pseudo-random encoding technique on images to enhance the security of the communication. In the L-SB approach, the fundamental thought is to replace the Least Significant Bits (LSB) of the cover picture with the Bits of the messages to be covered up without pulverizing the property of the cover image significantly. The LSB-based method is the most difficult one as it is hard to separate between the cover-object and stego-object if few LSB bits of the cover are replaced. In Pseudo-Random technique, an arbitrary key is utilized as a seed for the Pseudo-Random Number Generator is required in the inserting procedure. Both the systems utilized a stego-key while installing messages inside the cover picture. By utilizing the key, the chance of getting attacked by the attacker is reduced.