Abstract
Nowadays, security plays a main role for data hiding and makes it confidential from unauthorized access. So steganography and cryptography techniques are used for data security. In this paper, 3-bit least significant bits technique is used for embedding secrete image into the cover image. The resultant image after embedding the secrete image into cover image is a “Stego Image.” Using Vvisual Cryptography, transferring the stego image over the wireless channel or Internet becomes more securable because it divides the encrypted message and transfers it into two shares based threshold. In this paper, ECC algorithm is used to kept data more secure and secrete which makes very hard to get secrete message even if the secrete message is disclose. These proposed systems will work on large size of image and result with high performance and accuracy with high PSNR for color image.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yadav S, Tripathi A, Yadav P (2017) Image steganography on color image using SVD and RSA with 2-1-4-LSB technique. In: International conference on computation of power, energy, information and communication (ICCPEIC), IEEE
Biradar R, Umashetty A (2016) A survey paper on steganography techniques. Int J Innov Res Comput Commun Eng 4. ISSN: 2320-9801
Gahan A, Devanagavi G (2019) A empirical study of security issues in encryption techniques. Int J Appl Eng Res 14(5). ISSN: 0973-4562
Singh N (2017) Survey paper on steganography. IRJES 6(1):68–71. ISSN: 2319-183X
Kaur S, Bansal S, Bansal R (2014) Steganography and classification of image steganography techniques. In: IEEE
Bharti S, Behal S, Sharma V (2018) Security enhancements for high quality image transaction with hybrid image steganography algorithm. In: Proceedings of the international conference on computing methodologies and communication, IEEE
Lokhande U (2014) An effective way of using LSB steganography in images along with cryptography. Int J Comput Appl 88(12):0975–8887)
Thakur R, Saravanan C (2016) Analysis of steganography with various bits of LSB for color images. In: International conference on electrical, electronics, and optimization techniques, IEEE
Yadav R, Nigam S (2018) An imporve color image stgnography using ECC algorithm. IJRRETAS 4(4). ISSN: 2455-4723
Jain A, Soni S (2017) Visual cryptography and image processing based approach for secure transactions in banking sector. In: International conference on telecommunication and networks, IEEE
Chavan S, Gurav Y (2018) Lossless tagged visual cryptography scheme using bit plane slicing for image processing. In: Proceedings of the international conference on inventive research in computing applications (ICIRCA), IEEE I.SBN: 978-1-5386-2456-2
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patani, K., Rathod, D. (2021). Advanced 3-Bit LSB Based on Data Hiding Using Steganography. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_42
Download citation
DOI: https://doi.org/10.1007/978-981-15-4474-3_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4473-6
Online ISBN: 978-981-15-4474-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)