Comparative Analysis for Steganographic LSB Variants

  • Namrata Singh
  • Jayati BhardwajEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810)


Combining the best features of steganography and cryptography is the trending concept which is being followed for the purpose of information security. Hence, this combination is making the data more powerful and secure against the prevailing security attacks and breaches. This paper represents the implementation of this combination on the two LSB variants, namely sequential LSB and randomized LSB. A comparison among the two approaches is carried out by adding a secret text into a video cover file. The concept of chaotic sequence has been used as the security approach that converts the secret data into random bits pattern. The proposed work uses the traditional LSB approach as basic steganographic model. The inference on the basis of parameters concludes that the randomized LSB shows better results than the sequential LSB scheme.


CVSS Hash LSB LSB + 3 Least significant bit (LSB) 


  1. 1.
  2. 2.
    Trivedi, M.C., et al.: Metamorphic cryptography using strength of chaotic sequence and XORing method. J. Intell. Fuzzy Syst. 32, 3365–3375 (2017)CrossRefGoogle Scholar
  3. 3.
  4. 4.
  5. 5.
    Ogras, H., Turk, M.: Digital image encryption scheme using chaotic sequences with a nonlinear function. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 6(7) (2012)Google Scholar
  6. 6.
    Swathi, A., Jilani, S.A.K.: Video steganography by LSB Substitution using different polynomial equations. Int. J. Comput. Eng. Res. (IJCER) 2(5) (2012)Google Scholar
  7. 7.
    Ramalingam, M.: StegoMachine-video steganography using modified LSB algorithm. World Acad. Sci. Eng. Technol. 50 (2011)Google Scholar
  8. 8.
    Kaur, M., Kaur, Er.A.: Improved security mechanism of text in video by using steganographic technique: a review. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5) (2015)Google Scholar
  9. 9.
    Singh, N., Yadav, V.K.: Trends in digital steganography: a survey. Int. J. Comput. Appl. (2017)Google Scholar
  10. 10.
    Gosalia, S., et al.: Embedding audio inside a digital video using LSB Steganography. In: 2016 International Conference on Computing for Sustainable Global Development (INDIAcom). IEEE (2016)Google Scholar
  11. 11.
    Bhautnage, P., Jeyakumar, A., Dahatonde, A.: Advanced video steganography algorithm. Int. J. Eng. Res. Appl. (IJERA) (2013)Google Scholar
  12. 12.
    Balaji, R., Naveen, G.: Secure data transmission using video steganography. In: 2011 IEEE International Conference on Electro/Information TechnologyGoogle Scholar
  13. 13.
    Bole, A.T., Patel, R.: Steganography over video file using random byte hiding and LSB technique. In: International Conference on Computational Intelligence and Computing Research. IEEE (2012)Google Scholar
  14. 14.
    Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: International Conference on Computational Intelligence and Computing Research. IEEE (2013)Google Scholar
  15. 15.
    Elsadig, M., et al.: High rate video streaming steganography. In: Proceedings of 2009 IEEE International Conference on Future Computer and Communications (2009)Google Scholar
  16. 16.
    Paul, R., et al.: Hiding large amount of data using a new approach of video steganography. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference) (2013)Google Scholar
  17. 17.
    Moon, S.K., Raut, R.D.: Analysis of secured video steganography using computer forensics technique for enhanced data security. In: Proceedings of 2013 IEEE 2nd International Conference on Image Information Processing (ICIIP-2013)Google Scholar
  18. 18.
    Liu, B., Liu, F., Yang, C., Sun, Y.: Secure steganography in compressed video bitstreams. In: 3rd International Conference on Availability, Reliability and Security. IEEE (2008)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.AKTU LucknowLucknowIndia

Personalised recommendations