Visible to the public Analysis of Image Steganography Techniques for Different Image Format

TitleAnalysis of Image Steganography Techniques for Different Image Format
Publication TypeConference Paper
Year of Publication2021
AuthorsKumar Gupta, Lalit, Singh, Aniket, Kushwaha, Abhishek, Vishwakarma, Ashish
Conference Name2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)
KeywordsBars, bit substitution, composability, distortion, Human Behavior, Image Steganography, Information management, LSB, Metrics, MSB, Payloads, pubcrawl, resilience, Resiliency, Secure File Sharing, security, steg analysis
AbstractSteganography is the method of hiding one type of information into other type of information, hiding a secret a message in a cover so that others can't know the presence of the secret information. It provides an extra layer of security in communication and information sharing. Security is an important aspect of the communication process; everyone want security in communication. The main purpose of this paper is to introduce security of information that people share among them. In this paper we are presenting different methods of substitution techniques of image steganography and their comparison. Least significant bit and most significant bit substitution techniques are used. Information is hidden in an image file and then decoded back for the secret message. Hiding the presence of any hidden information makes this more secure. This implementation can be used by secret service agencies and also common people for secure communication.
DOI10.1109/ICAECT49130.2021.9392492
Citation Keykumar_gupta_analysis_2021