Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 21
Page No. 7821 - 7827

Analysis of Steganography on PNG Image using Least Significant Bit (LSB), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE)

Authors : Priyandanu Filzasavitra, Tito Waluyo Purboyo and Randy Erfa Saputra

References

Akhtar, N., V. Ahamad and H. Javed, 2017. A compressed LSB steganography method. Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), February 9-10, 2017, IEEE, Ghaziabad, India, ISBN:978-1-5090-6219-5, pp: 1-7.

Al-Omari, Z.Y. and A.T. Al-Taani, 2017. Secure LSB steganography for colored images using character-color mapping. Proceedings of the 2017 8th International Conference on Information and Communication Systems (ICICS), April 4-6, 2017, IEEE, Irbid, Jordan, ISBN:978-1-5090-4244-9, pp: 104-110.

Al-Omari, Z.Y. and A.T. Al-Taani, 2017. Secure LSB steganography for colored images using character-color mapping. Proceedings of the 2017 8th International Conference on Information and Communication Systems (ICICS), April 4-6, 2017, IEEE, Irbid, Jordan, ISBN:978-1-5090-4244-9, pp: 104-110.

Arora, A., M.P. Singh, P. Thakral and N. Jarwal, 2016. Image steganography using enhanced LSB substitution technique. Proceedings of the 4th International Conference on Parallel, Distributed and Grid Computing (PDGC’16), December 22-24, 2016, IEEE, Waknaghat, India, ISBN:978-1-5090-3670-7, pp: 386-389.

Joshi, K., R. Yadav and S. Allwadhi, 2016. PSNR and MSE based investigation of LSB. Proceedings of the 2016 International Conference onComputational Techniques in Information and Communication Technologies (ICCTICT), March 11-13, 2016, IEEE, New Delhi, India, ISBN:978-1-5090-0082-1, pp: 280-285.

Juarez-Sandoval, O., M. Cedillo-Hernandez, G. Sanchez-Perez, K. Toscano-Medina and H. Perez-Meana et al., 2017. Compact image steganalysis for LSB-matching steganography. Proceedings of the 2017 5th International Workshop on Biometrics and Forensics (IWBF), April 4-5, 2017, IEEE, Coventry, UK., ISBN:978-1-5090-5792-4, pp: 1-6.

Lee, C.W. and W.H. Tsai, 2010. A new Steganographic method based on information sharing via PNG images. Proceedings of the 2nd International Conference on Computer and Automation Engineering (ICCAE), February 26-28, 2010, IEEE, Singapore, Singapore, ISBN:978-1-4244-5569-0, pp: 807-811.

Patel, N. and S. Meena, 2016. LSB based image steganography using dynamic key cryptography. Proceedings of the 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), November 18-19, 2016, IEEE, Dehradun, India, ISBN:978-1-5090-4506-8, pp: 1-5.

Rohayah, S., G.W. Sasmito and O. Somantri, 2015. [Application of steganography for messaging of messages (In Indonesian)]. J. Inf., 9: 975-981.
Direct Link  |  

Sahu, A.K. and G. Swain, 2016. A review on LSB substitution and PVD based image steganography techniques. Indonesian J. Electr. Eng. Comput. Sci., 2: 712-719.
CrossRef  |  Direct Link  |  

Sari, W.S., E.H. Rachmawanto and C.A. Sari, 2017. A good performance OTP encryption image based on DCT-DWT steganography. Telkomnika, 15: 1987-1995.
CrossRef  |  Direct Link  |  

Singh, Y.K. and S. Sharma, 2016. Image steganography on gray and color image using DCT enhancement and RSA with LSB method. Proceedings of the 2016 International Conference on Inventive Computation Technologies (ICICT) Vol. 3, August 26-27, 2016, IEEE, Coimbatore, India, ISBN:978-1-5090-1286-2, pp: 1-5.

Wang, F., W.L. Lyu and J.S. Pan, 2016. Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format. IET. Image Process., 10: 971-978.
CrossRef  |  Direct Link  |  

Zhang, T., Y. Zhang, X. Ping and M. Song, 2006. Detection of LSB steganography based on image smoothness. Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, July 9-12, 2006, IEEE, Toronto, Ontario, Canada, pp: 1377-1380.

Zhou, X., W. Gong, W. Fu and L. Jin, 2016. An improved method for LSB based color image steganography combined with cryptography. Proceedings of the 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), June 26-29, 2016, IEEE, Okayama, Japan, ISBN:978-1-5090-0807-0, pp: 1-4.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved