Comparison Study Between Simple LSB and Optimal LSB Image Steganography

Document Type : Regular Articles

Authors

1 Computer Science Department, Faculty of Computers and Information, Assuit University, Assuit 71516, Egypt.

2 Computer Science Department, Faculty of Computers and Artificial Intelligence, Sohag University, Sohag 82524, Egypt

3 Computer Science Department, New Cairo Academy, Cairo 11835, Egypt

Abstract

There is no denying communication’s role in the evolution of the internet and other digital technologies. Information comes in many forms, and its conveyance necessitates a wide variety of methods of communication. We must communicate these types of data over a secure communication channel on the internet because they include confidential and sensitive information. One of the most challenging issues was figuring out how to send sensitive information without raising suspicion. Cryptography and steganography are just two examples of many methods used to conceal information from prying eyes, all to protect sensitive data from being misused or altered by unauthorized parties. Using an encryption method, cryptography transforms information from its original, easily decipherable form (plain text) into a completely meaningless one (cipher text). We can also use a decryption technique to change the encrypted text back into plain text. Steganography is a technique used to transmit information through other forms of digital media secretly. Due to the difficulty in visually detecting hidden data, the image will serve as the cover media for this thesis. The well-known method used to conceal confidential information is LSB (Least Significant Bit). The LSB method is based on exchanging bits of the cover medium for bits of private data.

Keywords

Main Subjects