An Analysis of LSB and DCT Based Stegnography

An Analysis of LSB and DCT Based Stegnography



This paper presents analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. Converting an image from a format like GIF or BMP, which reconstructs the original message exactly (lossless compression) to a JPEG, which does not (lossy compression), and then back could destroy the information hidden in the LSBs. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture.. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis ( in terms of PSNR) has been done in this paper. This paper discusses a data hiding application using steganography.The purpose of this paper is to create a user friendly steganography application that allows users to hide private data in image files. Our goal was to make our steganography application less vulnerable to steganalysis than the existing steganography tools in the market. Steganography is the process of hiding a secret message within another message. Steganography can be an invaluable tool in maintaining confidentiality, which is one of the three policies computer security is concerned with, along with integrity and availability. The importance of steganography lies in the fact that it hides the very existence of the secret it is protecting. Attackers are threats because they attempt to damage or gain access to assets by taking advantage of these asset’s vulnerabilities. makes the job of the attacker more difficult the very existence of the asset is hidden. Steganography can be classified as[1]: 1) Pure Steganography: A steganographic system that does not require the exchange of a cipher such as a stego-key. The least secure method based upon the presumption that no other parties are aware of this secret message and not at all the case in Internet.2) Secret Key Steganography A steganographic system that requires the exchange of a secret (stego-key) prior to communication. This method is more susceptible to interception and if in- tercepted, parties who know the secret key only can extract

Free download research paper



Related

Assembly of Protein Tertiary Structures

DCT based Image Steganographic Method Resisting Statistical Attacks CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER