EasyChair Preprint 3764
EasyChair Preprint 3764
EasyChair Preprint 3764
№ 3764
Anoop Kumar
July 6, 2020
Information Hiding in Images Using
Steganography Techniques
ANOOP KUMAR
INTRODUCTION
10110011
VARIOUS APPLICATIONS
1. Storing authenticated and secured data.
2. Protection of Data Modifications.
3. It is the access control system for the Digital
Content Distribution.
4. E-Commerce.
5. Media.
6. Database Systems.
7. Digital Watermarking
CONCLUSIONS
It is observed that with LSB Substitution Steganographic
method, the results generated in data hiding are quite
impressive as it make use of the fact that any image could be
broken up to individual bit-planes each holding different
levels of information. It is to be observed that as discussed
earlier, this method is only used for bitmap images because
these involves lossless compression techniques. But this
technique can also be extended to be utilized for colour
images where, bitplane slicing is to be performed individually
for the top four bit-planes for each of the RGB of the message
image.
It’s also important to note that though steganography was
once unrecognised, with the various techniques currently
used, it is not only easy to detect the presence but also
retrieving them is easier. For instance, without the need to use
of a software or complex tools for detection, simple
techniques to observe if an image file has been manipulated
are: 1. Image size: A steganographic image has a huge storage
size as compared to a regular image of the same dimensions
i.e. if the storage size of the original image would be a few
KBs, the steganographic image could be several MBs in size.
This changes with the resolution and type of image used. 2.
Noise in image: A steganographic image has a noise as
compared to a regular image. So, this is the reason why
initially little noise is been added to the cover image, such that
the steganographic image does not appear too noisy as
compared to the original cover image.
REFERENCES