Skip to main content

A Survey on Image Steganography Techniques Using Least Significant Bit

  • Conference paper
  • First Online:
Intelligent Data Communication Technologies and Internet of Things

Abstract

Steganography is the technique in which the information is hidden within the objects so that the viewer cannot track it down and only the reserved recipient will be able to see it. The data can be concealed in different mediums such as text, audio and video files. Hiding the information in image or picture files is called image steganography. This steganography method helps in protecting the data from malicious attacks. The image chosen for steganography is known as cover image and the acquired image as stego image. A digital image can be described using pixel values, and those values will be modified using least significant bit (LSB) technique. To increase the security, various LSB techniques had been proposed. We made a comparison on various image steganography techniques based on the parameters like robustness, imperceptibility, capacity and security. In this paper, based on the comparisons we have suggested few image steganography algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ardy RD, Indriani OR, Sari CA, Setiadi DRIM, Rachmawanto EH (2017) Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5). In: IEEE International conference on smart cities, automation & intelligent computing systems (ICON-SONICS), pp 87–92

    Google Scholar 

  2. Astuti YP, Setiadi DRIM, Rachmawanto EH, Sari CA (2018) Simple and secure image steganography using LSB and triple XOR operation on MSB. In: International conference on information and communications technology (ICOIACT), pp 191–195

    Google Scholar 

  3. Bhavani Y, Sai Srikar P, Spoorthy Shivani P, Kavya Sri K, Anvitha K (2020) Image segmentation based hybrid watermarking algorithm for copyright protection. In: 11th IEEE international conference on computing, communication and networking technologies (ICCCNT)

    Google Scholar 

  4. Bhuiyan T, Sarower AH, Karim R, Hassan M (2019) An image steganography algorithm using LSB replacement through XOR substitution. In: IEEE international conference on information and communications technology (ICOIACT), pp 44–49

    Google Scholar 

  5. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Sign Process 51(7):1995–2007

    Google Scholar 

  6. Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. In: Delp EJ, Wong PW (eds) IS&T/SPIE electronic imaging: security, steganography, and watermarking of multimedia contents VI. SPIE, San Jose, pp 23–34

    Chapter  Google Scholar 

  7. Islam MR, Siddiqa A, Uddin MP, Mandal AK, Hossain MD (2014) An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: IEEE international conference on informatics, electronics & vision (ICIEV), pp 1–6

    Google Scholar 

  8. Ker AD (2005): Steganalysis of LSB matching in gray scale images. IEEE Sign Process Lett 12(6):441–444

    Google Scholar 

  9. Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. J. Radio Eng 18:509–516

    Google Scholar 

  10. Joshi K, Dhankhar P, Yadav R (2015) A new image steganography method in spatial domain using XOR. In: Annual IEEE India conference (INDICON), pp 1–6, New Delhi

    Google Scholar 

  11. Irawan C, Setiadi DRIMC, Sari A, Rachmawanto EH (2017) Hiding and securing message on edge areas of image using LSB steganography and OTP encryption. In: International conference on informatics and computational sciences (ICICoS), Semarang

    Google Scholar 

  12. Swain G ((2016)) Digital image steganography using variable length group of bits substitution. Proc Comput Sci 85:31–38

    Google Scholar 

  13. Channalli S, Jadhav A (2009) Steganography an art of hiding data. J Int J Comput Sci Eng (IJCSE) 1(3)

    Google Scholar 

  14. Dhaya R (2021) Analysis of adaptive image retrieval by transition Kalman filter approach based on intensity parameter. J Innov Image Process (JIIP), pp 7–20

    Google Scholar 

  15. Manoharan JS (2016) Enhancing robustness of embedded medical images with a 4 level Contourlet transform. Int J Sci Res Sci Eng Technol pp 149–154

    Google Scholar 

  16. Mathew N, Manoharan JS (2012) A hybrid transform for robustness enhancement of watermarking in medical images. Int J Digital Image Process 4(18):989–993

    Google Scholar 

  17. Bhardwaj R, Sharma V (2016) Image steganography based on complemented message and inverted bit LSB substitution. Proc Comput Sci 93:832–838

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhavani, Y., Kamakshi, P., Kavya Sri, E., Sindhu Sai, Y. (2022). A Survey on Image Steganography Techniques Using Least Significant Bit. In: Hemanth, D.J., Pelusi, D., Vuppalapati, C. (eds) Intelligent Data Communication Technologies and Internet of Things. Lecture Notes on Data Engineering and Communications Technologies, vol 101. Springer, Singapore. https://doi.org/10.1007/978-981-16-7610-9_20

Download citation

Publish with us

Policies and ethics