An Enhanced Method for Least Significant Bit Image Steganography using Discrete Logarithmic Dispersion Strategy

this paper a novel method for information security using image steganography technique is proposed. This project simply hides a text message in an image file. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This work intends to give an overview of image steganography, its uses and techniques. The proposed method uses the LSB (Least Significant Bit) technique to hide information in the cover image. The system enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original image. Discrete logarithm calculation technique is used for determining the location of the bit into pixel to embed the message. The proposed algorithm provides a stego-key that will be used during the embedding and extracting of the message.

[1]  Chet Hosmer,et al.  An Overview of Steganography , 2011, Adv. Comput..

[2]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .

[3]  Shawn D. Dickman An Overview of Steganography , 2007 .

[4]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[5]  Yixian Yang,et al.  Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[6]  Selangor Darul Ehsan,et al.  Information Hiding using LSB technique , 2011 .

[7]  Tai-hoon Kim,et al.  Text Steganography: A Novel Approach , 2009 .

[8]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[9]  Steganography Steganography,et al.  An Analysis of Steganographic Techniques , 1998 .

[10]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..