Title | Analysis of Image Steganography Techniques for Different Image Format |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Kumar Gupta, Lalit, Singh, Aniket, Kushwaha, Abhishek, Vishwakarma, Ashish |
Conference Name | 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT) |
Keywords | Bars, bit substitution, composability, distortion, Human Behavior, Image Steganography, Information management, LSB, Metrics, MSB, Payloads, pubcrawl, resilience, Resiliency, Secure File Sharing, security, steg analysis |
Abstract | Steganography is the method of hiding one type of information into other type of information, hiding a secret a message in a cover so that others can't know the presence of the secret information. It provides an extra layer of security in communication and information sharing. Security is an important aspect of the communication process; everyone want security in communication. The main purpose of this paper is to introduce security of information that people share among them. In this paper we are presenting different methods of substitution techniques of image steganography and their comparison. Least significant bit and most significant bit substitution techniques are used. Information is hidden in an image file and then decoded back for the secret message. Hiding the presence of any hidden information makes this more secure. This implementation can be used by secret service agencies and also common people for secure communication. |
DOI | 10.1109/ICAECT49130.2021.9392492 |
Citation Key | kumar_gupta_analysis_2021 |