Abstract
Steganography plays an important role in computer science. With the development of technology, steganography technique is used for safe transmission of data in digital media. This technique hides the data in a symbol to prevent its comprehensibility and its solvability, so that it can be safely delivered to the receiver. Steganagrofiq method LSB was used in this study. The gray scaled jpg format was analyzed in the same images, visually unaware, that the data could be stored using the LSB method up to the 4th bit level. It worked on five same jpg but different pixel format images in 1024 × 1024, 512 × 512, 256 × 256, 128 × 128, 64 × 64 pixel sizes. From a visible standpoint, it seems logical in every five views. Histograms were plotted to visualize the differences between the original and the encoded. The rates of different images of the same images were calculated by embedding data, extracting data, comparing the byte and elapsed time, and calculating the distortion rates PSNR, SNR, MSE in the images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Haveliya, A.: A new approach for secret concealing in executable file. Int. J. Eng. Res. Appl. 2(2), 1672–1674 (2012)
Agarval, M.: Text steganographic approaches: a comparison. Int. J. Netw. Secur. Its Appl. 5(1) (2013)
Rosziati, I., Kuan, T.S.: Steganography algorithm to hide secret message inside an image. Comput. Technol. Appl. 2, 102–108 (2011)
Seetha, D., Eswaran, P.: A study on steganography to hide secret message inside an image. Int. J. P2P Netw. Trends Technol. 3(5), 33–37 (2013)
Khan, M., Jamil, A., Farman, H., Zubair, M.: A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J. Sci. Res. 22(5), 647–654 (2014)
Rani, N., Chaudhary, J.: Text steganography techniques: a review. Int. J. Eng. Trends Technol. 4(7), 3013–3015 (2013)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) Third International Workshop IH 1999, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Tiwari, R. K., Sahoo G.: Some new methodologies for image hiding using steganographic techniques. http://arxiv.org/abs/1211.0377. Accessed 13 Sept 2018
Higgins, D.: Differences between file format. https://www.photoup.net/differences-between-fileformats-raw-dng-tiff-gif-png-jpeg/. Accessed 13 Sept 2018
Manjula, G.R., Danti, A.: Novel hash based least significant bit (2-3-3) image steganography in spatial domain. Int. J. Eng. Trends Technol. 4(1), 11–20 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Inan, Y. (2019). Comparing Image Distortion of LSB. In: Aliev, R., Kacprzyk, J., Pedrycz, W., Jamshidi, M., Sadikoglu, F. (eds) 13th International Conference on Theory and Application of Fuzzy Systems and Soft Computing — ICAFS-2018. ICAFS 2018. Advances in Intelligent Systems and Computing, vol 896. Springer, Cham. https://doi.org/10.1007/978-3-030-04164-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-04164-9_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04163-2
Online ISBN: 978-3-030-04164-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)