Steganography plays an important role in computer science. With the development of technology, steganography technique is used for safe transmission of data in digital media. This technique hides the data in a symbol to prevent its comprehensibility and its solvability, so that it can be safely delivered to the receiver. Steganagrofiq method LSB was used in this study. The gray scaled jpg format was analyzed in the same images, visually unaware, that the data could be stored using the LSB method up to the 4th bit level. It worked on five same jpg but different pixel format images in 1024 × 1024, 512 × 512, 256 × 256, 128 × 128, 64 × 64 pixel sizes. From a visible standpoint, it seems logical in every five views. Histograms were plotted to visualize the differences between the original and the encoded. The rates of different images of the same images were calculated by embedding data, extracting data, comparing the byte and elapsed time, and calculating the distortion rates PSNR, SNR, MSE in the images.


Image processing Steganography LSB method Cover image Hiding secret message Stego-image Extract cover image PSNR SNR MSE 


  1. 1.
    Haveliya, A.: A new approach for secret concealing in executable file. Int. J. Eng. Res. Appl. 2(2), 1672–1674 (2012)Google Scholar
  2. 2.
    Agarval, M.: Text steganographic approaches: a comparison. Int. J. Netw. Secur. Its Appl. 5(1) (2013)Google Scholar
  3. 3.
    Rosziati, I., Kuan, T.S.: Steganography algorithm to hide secret message inside an image. Comput. Technol. Appl. 2, 102–108 (2011)Google Scholar
  4. 4.
    Seetha, D., Eswaran, P.: A study on steganography to hide secret message inside an image. Int. J. P2P Netw. Trends Technol. 3(5), 33–37 (2013)Google Scholar
  5. 5.
    Khan, M., Jamil, A., Farman, H., Zubair, M.: A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J. Sci. Res. 22(5), 647–654 (2014)Google Scholar
  6. 6.
    Rani, N., Chaudhary, J.: Text steganography techniques: a review. Int. J. Eng. Trends Technol. 4(7), 3013–3015 (2013)Google Scholar
  7. 7.
    Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) Third International Workshop IH 1999, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)Google Scholar
  8. 8.
    Tiwari, R. K., Sahoo G.: Some new methodologies for image hiding using steganographic techniques. Accessed 13 Sept 2018
  9. 9.
    Higgins, D.: Differences between file format. Accessed 13 Sept 2018
  10. 10.
    Manjula, G.R., Danti, A.: Novel hash based least significant bit (2-3-3) image steganography in spatial domain. Int. J. Eng. Trends Technol. 4(1), 11–20 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Near East UniversityNicosia, Mersin 10Turkey

Personalised recommendations