An Approach on Image Steganography Based on the Least Significant Bit Algorithm

An Approach on Image Steganography Based on the Least Significant Bit Algorithm

Karthik Chelakkara Murugan, Debabrata Samanta, Mausumi Goswami
DOI: 10.4018/978-1-6684-4580-8.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Steganography is the practice of communication by covering information within other information mediums. The goal of steganography is to hide information in such a way that it remains hidden so that it looks normal from a commoner's perspective. It has been prevalent since ancient times, with the first use dating back to 440 BC in Greece. The etymology of steganography is a combination of the Greek words: steganos, “covered,” and graphia, “writing.” The modern usage of steganography, termed digital steganography, hides information in files stored on a computer. A standard steganography algorithm has three essential components: carrier, message, and key. Carrier is the file that carries the message and an optional key to add a layer of authentication. Researchers have implemented steganography utilizing different carriers, for example, image, audio, and text. The carrier may or may not have any relation with the confidential information. Image steganography is a type of steganography that deals with hiding a message in an image file. The image, as a result, ends up with noise.
Chapter Preview
Top

Design Of The Proposed System

The proposed system is designed in two phases:

  • 1.

    Automated Collection System

  • 2.

    Automated Detection System

• Automated Collection System: In this phase, a stego-bot master sends the image files in an SNS IM, and is received by the end-user. This then is stored in the internal storage, and collected in an “Inspection Server”, after which we move onto the next phase. An SNS IM chatroom is set up in KakaoTalk Instant Messenger application. The smartphone, also termed “Defender” joins the chatroom(Eyssa, Asmaa Abdelmonem, et al. 2020), (Fu, Zhangjie, et al. 2020). Then, the images are sent randomly to the chatroom at some set intervals of time (120 min) to the KakaoTalk chatroom. These images then are stored in the internal storage of the Defender device(G. F. Siddiqui et al. 2020), (Gutub et al. 2020), (Gutub et al. 2020). The storage location is found, and the images are stored in hex format, which is then converted to .png or .jpg after the extension of the file is determined using the Hex Editor. After converting the images to .jpg and .png format, the images are sent to the “Inspection Server”. This is done by using a synchronisation application known as FolderSync. This application synchronises the internal storage and moves the files to PC(Hsieh et al. 2022), (J. Cui et al. 2021), (J. Liu et al. 2020). Therefore, Automated Collection Component is completed.

Complete Chapter List

Search this Book:
Reset