Web-based Image Steganography Application to Hide Secret Messages

2021 ◽  
Vol 9 (3) ◽  
pp. 375
Author(s):  
Putu Isthu Canistya Chandra ◽  
I Ketut Gede Suhartana

The Internet has become a very popular medium for communicating and exchanging information data. However, with the development of technology, information data theft is becoming more frequent so it is very necessary to maintain the security of information data. To maintain the security of information data, steganography can be used, namely hiding data or information to a medium. Least Significant Bit (LSB) is a method that can be used to perform the insertion. The Least Significant Bit (LSB) replaces the insignificant or smallest bit value so that when an insertion is done, the difference is not clear. So, this research aims to make a steganography application using the Least Significant Bit (LSB) method.

Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
Bakhan Tofiq Ahmed

<p>Information is a vitalthing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the concealing science in which the information is concealed inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide data inside a cover media for example text, image, and audio steganography, but image steganography is the most utilized technique among the others. Secure image steganography has a high-security level than traditional technique by combining steganography with cryptography due to encrypting secret information by cryptography algorithm before embedding it into the cover media by steganography algorithm. In this paper,a systematic review has been presented about secure image steganography and its renowned types. Many researchers proposed secure image steganography by using various cryptography and steganography algorithms which have been reviewed. The least significant bit ‘LSB’ was the renowned steganography algorithm which has been used by researchers due to its simplicity, while various cryptography algorithms like advanced encryption standard (AES) and blowfishhave been used to propose secure image steganography in the reviewed papers. The comparison among the reviewed papers indicated that the LSB with hash-RSA gave a greater peak signal-noise ratio ‘PSNR’ value than the others which was 74.0189 dB.</p>


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3706-3710

In this advanced world with the growing technology, the demand for security of information is needed in any communication streams of data which is being conveyance from host to intended host over the internet. Obviously, a huge & numerous amount of the data or the information are transferred in our everyday. So, the demand for securing information has become the main concern. Image Steganography is one of the important areas in the field of Steganography. The main purpose of steganography is to protect the surreptitious information from others except from intended receiver & by increasing the security of the covert data in the significant way that information can’t be revealed although the intruder knows the methodology of the embedding process. In this paper, The aim is to propose a different yet, an innovative steganographical technique which provides the security on our digital image, and by using a quality measuring technique like Mean Square Error(MSE), Peak Signal Noise Ratio (PSNR) which assure the quality of image has been not degraded even after infusing the covert data inside the image. So to overcome these issues, this paper, suggests a new method to maintain the quality of the image. After embedding the authenticated information in the cover image using Region-Based Least Significant Bit (LSB) technique that provides security of digital image


2020 ◽  
Vol 2 (2) ◽  
pp. 113-127
Author(s):  
Nova Indrayana Yusman

Yamaha Vixion Club Bandung (YVCB) was formed on July 7, 2007 in the city of Bandung, as a place of friendship between Yamaha Vixion motorcyclists. In its organizational structure, YVCB has a Human Resource Development (HRD) division. Until now, there are more than 800 Yamaha Vixion Club Bandung members. This software is made to facilitate the work of the Yamaha Vixion Club Bandung HRD Division in processing member data. Created using Microsoft Webmatrix as an editor with the PHP programming language. The database uses MySQL with PHPMyAdmin as the software. The method used in making this software is prototyping so that between developers and customers can understand each other what the customer wants. The purpose of making web-based member data management software is that in terms of managing member data it can be done anytime and anywhere by just accessing the internet. In the use of the program, the author chose to use PHP, because PHP is the best and easiest to use in website programming language. Based on the last paragraph, the author intends to make aplication based computerized attendance so that become effective and efficient in terms of time.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Muchammad Ismail Hamzah

In accordance with the technological advances of web-based information delivery via the internet has more value, because the information can be delivered easily, quickly,  spacious and interactive. Because this way, information is simply inserted into the web and within seconds the information can be accessed globally.  Submission of this information has not been used in Ngebruk Islamic Junior High School, Sumberpucung District, Malang Regency. Submission of the information in these schools still use manual way, such as by mail, bulletin boards, or orally. Surely this way less effective and efficient, since it requires a lot of expenses such as the purchase of paper, printing machine and maintenance, ink, and its scope was limited to the scope of the school.To reduce the above problems, the delivery of information in this school need to use web media created with the PHP programming language and MySQL. PHP is a programming language that is used to allow users to process information on the web, while MySQL is the software used to store the information on the web. Once the web is run online, the school entered information to the web, can be accessed via intenet by anyone without the limited space and time


Public Voices ◽  
2017 ◽  
Vol 5 (3) ◽  
pp. 3
Author(s):  
Mark Peterson

"Distance education" at the college level is well over a century old.  It has served the needs of a numerically large, but proportionately small population of learners who have eschewed the campus classroom.  These correspondence school enrollees, educational TV watchers, and audiocassette listeners have had only modest impact on the structure, mission, and strategy of the institutions serving them.  But that is now changing, and changing very dramatically.  The advent of the Internet, interactive television technology, and web-based instructional software, coupled with administrative and political perceptions of educational reformation and fiscal efficiency, may be causing nothing less than a revolution in higher education.  By applying a feminist model of assessment called "unthinking technology," that is to say, exploring the potential, but unthought of socio-political aspects of this technological revolution, this paper raises significant questions about the security of the traditional academic enterprise.  "The Politics of Distance Education" urges a pro-active embrace of these technologies by the academy in order to enable a legitimate "competency for grievance" so that the protection of the validity of higher education, and legitimacy of the academic profession can be ethically defended and publicly respected, rather than being viewed as mulish resistance to the inevitable.


2004 ◽  
Vol 23 (4) ◽  
pp. 245-256
Author(s):  
Shun-Hsing Chen ◽  
Ching-Chow Yang

Quality function deployment (QFD) is an essential tool in implementing total quality management (TQM). This study applies a Web-QFD approach using group decision-making analysis in the Web environment to reduce the complicated data collection, aggregation and analysis processes. A Web-based questionnaire is designed by using an active service pages (ASP) involving the Internet relay chat (IRC) technique and the Delphi method with Internet (E-Delphi) to determine the importance degree of the customers' requirements. However, the traditional Delphi method is time-consuming mission. This study applies the proposed Web-QFD approach to efficiently gather the individual opinions of each team member, the requirements that are critical for customers, and then enables decision makers to accurately assess the priorities of these requirements. An empirical example of an education system in Taiwan is employed to demonstrate the practicability of the proposed Web-QFD model. This real world example involves team members communicating easily and quickly with other experts in the team through the Internet to accelerate the reaching of a consensus among multiple decision makers regardless of where their location. Customers' requirements can be rapidly prioritized based on the assessment results.


Sign in / Sign up

Export Citation Format

Share Document