2019
DOI: 10.30534/ijatcse/2019/64832019
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of LSB, LSB2, PVD Methods of Data Steganography

Abstract: Steganography is the art of hiding data in another covering medium. This process is very important because it is used in various applications concerned deferent life fields. In this paper we will introduce 3 methods of data steganography: LSB, LSB2 and PVD. These methods will be implemented, tested and analyzed. The obtained experimental results will be compared in order to do some judgment regarding the quality, capacity, hiding time and extracting time.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…LSB2 method provides a higher capacity than LSB method, because it reserves 4 bytes from the carrier image to hide one character from the secrete message, as shown in figure 2 the least two significant bits from the carrier byte are used to hide two bits from the message character [21]. LSB2 method is very simple in handling hiding process (see figure 3) and handling extraction process (see figure 4), it requires a small times to implement these processes, also it provides a good quality parameters by minimizing the values of MSE and maximizing the values of PSNR [22]. LBS2 suffers from the low level of security, and it is easy for third party (hacker) to extract the hidden message, knowing that the used method of data hiding was LSB2.…”
Section: -Steganography Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…LSB2 method provides a higher capacity than LSB method, because it reserves 4 bytes from the carrier image to hide one character from the secrete message, as shown in figure 2 the least two significant bits from the carrier byte are used to hide two bits from the message character [21]. LSB2 method is very simple in handling hiding process (see figure 3) and handling extraction process (see figure 4), it requires a small times to implement these processes, also it provides a good quality parameters by minimizing the values of MSE and maximizing the values of PSNR [22]. LBS2 suffers from the low level of security, and it is easy for third party (hacker) to extract the hidden message, knowing that the used method of data hiding was LSB2.…”
Section: -Steganography Methodsmentioning
confidence: 99%
“…The process of steganography must not add noticeable updates to the stego_image, thus the changes in the stego_image must not be noticed by human eyes. Stego_method must provide the following features [21], [22]:…”
Section: -Introductionmentioning
confidence: 99%
“…Big size color image is usually used as a covering media. One of the most popular methods of data steganography is LSB method [12][13][14][15][16][17][18]. This method uses 8 bytes from the covering image to hide one character of the secret message.…”
Section: Introductionmentioning
confidence: 99%
“…It hides directly the secret bits in the pixels of the cover image either in a uniform or adaptive manner, by simple substitution or by more improved versions of substitution. Although often the visual analysis cannot detect the distortion due to the stego image, the fact that the pixels of the cover image are modified disjointly causes a disturbance in the distribution of the LSB of the pixels of the stego image, thus making the image easily detectable by a statistical attack [9]- [11].…”
Section: Introductionmentioning
confidence: 99%