“Steganography”- Data Hiding Using Image Object
Saurabh D Kumbhekar
PG Student,
Department Of Computer Science
GH Raisoni University, Amravti, India
Received on: 11 May ,2024 Revised on: 18 June ,2024 Published on: 29 June ,2024
Abstract— Due to a vast increase in security breaches and other violations, Data hiding has become a vital measure for the protection of the integrity of an individual or a group. Image steganography is a perfect technique that exists for the protection of data from getting altered and getting safely transmitted. Steganography serves as an excellent method to secure information as the unauthorized party barely recognizes the secret message or a text that is hidden behind the original or the cover image. In this project we have mainly focused on the Least Significant Bit (LSB) for hiding the texts behind the images and build our idea through a GUI. LSB is quiet simple and an efficient algorithm in which the least significant bit that barely changes the quality or the build of the original image is changed and is replaced by the secret text that we want to communicate to the other users.
The records of leak of touchy facts on structures has a critical chance to company facts being protection. Statistics display that the mistaken encryption of documents and communication because of human mistakes is one of the main reasons for records loss. The fast improvement of facts through made it simpler to ship the facts correctly and quicker to the vacation spot There are many transmission media to switch the facts to vacation spots like e-mails, at the identical time, its miles can be simpler to adjust and misuse the treasured records through hacking. Steganography refers documents as the quilt report to cover any other virtual report that consists to the fact that it is being transmitted. This project using to follow steganography using LSB algorithm after which the output of the encrypted image using a clustering to offer a photo steganography to offer a protection layer to that file.
Keywords – Data Hiding; Least Significant Bit; Data Security; Image Steganography.
Doi Link – https://doi.org/10.69758/GIMRJ2406I8V12P112
Download