The Investigation of LSB based Image Steganographic Techniques in Spatial Domain for Secure Communication

Image Steganography in spatial domain

Authors

  • Shahid Rahman Abasyn University Peshawar KPK Pakistan
  • Fahad Masood Abasyn University Peshawar Pakistan
  • Wajid Ullah Khan Abasyn University Peshawar Pakistan
  • Abdus Salam Abasyn University Peshawar Pakistan
  • Syed Irfan Ullah Abasyn University Peshawar Pakistan

DOI:

https://doi.org/10.30537/sjet.v2i1.311

Keywords:

Steganography, Data concealing, Cover writing

Abstract

All the conveying bodies need the confidentiality, integrity and authenticity of their secret data. Distinctive methodologies are utilized to adapt these security issues like digital certificate, digital signature and cryptography. But these techniques alone can't be traded off. Steganography is the best answers for these issues as it hide the presence of secret information. Steganography will get its importance in view of its exponential advancement and riddle data of possible PC customers over the web. It can likewise be depicted as the examination of indistinct information that usually manages the methodologies for concealing the closeness of the passed on message. For the most a piece of data covering is refined in correspondence, image, content, voice or sight and sound substance for copyright, military correspondence, confirmation and various diverse purposes. Image steganography strategies have been talked about in this exploration Least Significant Bit (LSB) strategy is watched for different cases. Result for various situations has been looked at and condition of the science assessment and examination of various accessible strategies for steganography have been given. The principles pursued are equivalent to given in the writing. This paper gives a condition of-the – science assessment and examination of the diverse accessible techniques for steganography along the side with some normal models and procedures drawn from the literature. However in this survey concludes with some recommendations and sponsors for the carries-oriented mechanism.

Keywords: Steganography, Data concealing, Cover writing

Downloads

Download data is not yet available.

Author Biographies

Shahid Rahman, Abasyn University Peshawar KPK Pakistan

MS student Department of computing and technology Abasyn university Peshawar 

Fahad Masood, Abasyn University Peshawar Pakistan

Assistant Professor Department of computing and technology Abasyn university Peshawar 

Wajid Ullah Khan, Abasyn University Peshawar Pakistan

Lecturer Department of computing and technology Abasyn university Peshawar 

Abdus Salam, Abasyn University Peshawar Pakistan

Professor and HOD  Department of computing and technology Abasyn university Peshawar 

Syed Irfan Ullah, Abasyn University Peshawar Pakistan

Assistant Professor Department of computing and technology Abasyn university Peshawar 

References

Abasyn University Peshawar KPK Pakistan
www.abasyn.edu.pk

Downloads

Published

2019-07-19