{"title":"Comparison Study Between Simple LSB and Optimal LSB Image Steganography","authors":"M. Mohamed, M. Mofaddel, T. Abd El-Naser","doi":"10.21608/sjsci.2022.165686.1036","DOIUrl":null,"url":null,"abstract":": There is no denying communication’s role in the evolution of the internet and other digital technologies. Information comes in many forms, and its conveyance necessitates a wide variety of methods of communication. We must communicate these types of data over a secure communication channel on the internet because they include confidential and sensitive information. One of the most challenging issues was figuring out how to send sensitive information without raising suspicion. Cryptography and steganography are just two examples of many methods used to conceal information from prying eyes, all to protect sensitive data from being misused or altered by unauthorized parties. Using an encryption method, cryptography transforms information from its original, easily decipherable form (plain text) into a completely meaningless one (cipher text). We can also use a decryption technique to change the encrypted text back into plain text. Steganography is a technique used to transmit information through other forms of digital media secretly. Due to the difficulty in visually detecting hidden data, the image will serve as the cover media for this thesis. The well-known method used to conceal confidential information is LSB (Least Significant Bit). The LSB method is based on exchanging bits of the cover medium for bits of private data.","PeriodicalId":146413,"journal":{"name":"Sohag Journal of Sciences","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sohag Journal of Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/sjsci.2022.165686.1036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
: There is no denying communication’s role in the evolution of the internet and other digital technologies. Information comes in many forms, and its conveyance necessitates a wide variety of methods of communication. We must communicate these types of data over a secure communication channel on the internet because they include confidential and sensitive information. One of the most challenging issues was figuring out how to send sensitive information without raising suspicion. Cryptography and steganography are just two examples of many methods used to conceal information from prying eyes, all to protect sensitive data from being misused or altered by unauthorized parties. Using an encryption method, cryptography transforms information from its original, easily decipherable form (plain text) into a completely meaningless one (cipher text). We can also use a decryption technique to change the encrypted text back into plain text. Steganography is a technique used to transmit information through other forms of digital media secretly. Due to the difficulty in visually detecting hidden data, the image will serve as the cover media for this thesis. The well-known method used to conceal confidential information is LSB (Least Significant Bit). The LSB method is based on exchanging bits of the cover medium for bits of private data.