Steganography - An Overview of Image Steganography Using LSB Methodology
Steganography - An Overview of Image Steganography Using LSB Methodology
Steganography - An Overview of Image Steganography Using LSB Methodology
LSB Methodology
S. Kaviseshan1, M. Thushitharan
1
Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe; 2 Faculty of Computing, Sri Lanka Institute of Information
Technology, Malabe
ABSTRACT
Steganography is a new growing technology in cyber security to protect secret or sensitive information from malicious
users. Early days we used encryptions and decryptions to protect sensitive information. Now a days steganography is
the latest technology to hide information. We can hide the secret information in the non-secret or ordinary files. And
this secret message will be got in the destination. By using steganography without any idea, we can send the secret
message to the receiver. We can send the secret messages in normal files like word or excel files or we can attach our
secret message in picture, and we can send it to the destination, and he also can get the secret message from that image.
We have developed a steganography tool for Information Security Project module. By using this tool, we can hide the
secret message within the “.png” type digital images and we can send that image with secret message, and we can use
this tool and we can separately find the secret message by using that tool. To hide secret message inside the image we
use a function call Encode and we have used a function call Decode to get the secret message from the image in that
tool. When we decode the secret message from the image it will show the base 64 encoded form and we can use online
decode tools and we can get the original form and this tool will run on both Linux and Windows environments.
INDEX TERMS:
Steganography, encryption, decryption, encode, decode, base64, security, LSB, Pixel, value, binary.
1. INTRODUCTION
and protection for sending secret message than using only
Now a days cyber security is the most talking topic in
steganography and using Cryptography alone.
the world. And Information is the most valuable asset in
To develop this Steganography tool, we have use
everywhere. To protect information from cyber threats,
python language and Linux operating System Environment
cyber security specialists are working on it. The basic of
and later on it we have applied it in Windows
information protection is came from the encryptions and
environments, and it succussed in Windows environment
decryptions. Here we changed our clear text to cipher text
also. Now this tool will work on both Linux and Windows
(encrypted text) by using encryption key then send it to the
environment. By using this tool, we can hide the secret
receiver and then they will decrypt the cipher text by using
message in the particular image or picture, and we can get
the key. This methodology developed and now it is in its
the secr3et message in the base 64 format by decode the
new evolution that is Steganography.
picture. After getting the secret message in the base 64
Steganography is a new technology to transfer or hide
format we can decode the message by using the online
secret message inside the non-secret files or ordinary files.
tools. After hide the message in the picture in this tool and
By hiding secret or sensitive information in non-secret or
we can send the image through Email, WhatsApp and
ordinary file attackers or others do not get doubt, or they do
Receiver can decode the secret message by using this tool.
not get any idea of it. We can send our secret message by
When it comes to WhatsApp, we have to send the image as
using this steganography technology. For the ordinary file
document file only it will work. If we send as image
we can use a simple picture or images or video file or audio
WhatsApp will remove the meta data from it because of its
file. We hide the secret message, and we can send the
security architecture. So, if we send in WhatsApp as image,
picture to the particular person and that person can get the
we can get the secret message. We can develop this tool
secret message from that image. By using steganography
more secure in feature with cryptographical functions. It
tools and we can hide the secret message in the ordinary
will provide more security to the secret message
files and send to the receiver and receiver can get the secret
transactions.
message from that steganography tools. Cryptography and
steganography are different functions and when we
combined both Cryptography and steganography it will A. Cryptography
give more security Cryptography is the technology that is used to
protect information from the cyber-attacks. Basically, it
changes the information or data to another format, and
it is help to
2 M. THUSHITHARAN, S. KAVISESHAN: STEGANOGRAPHY – AN OVERVIEW OF IMAGE STEGANOGRAPHY USING LSB METHODOLOGY.
This listPngFiles() function has written for list the .png files
This encodeText() function get the image, secret message, from the same folder. This doesn’t concern about the
encoded image name from the user and it will create a new security part of the product. This function has written for
image file. find the OS platform and execute the listing command of
the operating system. First it will check whether the system
is windows or not. If it is windows, it will execute the “dir
*.png” command which is used to list the png files in
windows platform. Or else if it is linux platform, it will
execute the “ls -a *.png” command which is used to list the
png files in linux platforms.
as 4, the program will be quit. Further more this function India., 22 February 2019.
contains some validations. If we give any number than
1,2,3,4 , it will throw a warning that tells us to enter the 3. CIOReview, “How SDN and IoT are impacting the
correct value. If we give alphabet or non-number value, it Healthcare Sector” [Online]. Available:
will throe a warning to enter the correct option value. https://www.cioreview.com/news/how-sdn-and-iot-are-
impacting-the-healthcare-sector-nid-33576-cid-147.html.
G. Best Security Practices for IoT in Healthcare [Accessed: 03- April- 2022].
Maybe the most difficult aspect of modernizing
historical technologies is ensuring that the infrastructure is
secure and impermeable
8. AUTHOR
1. Complete Security Assessment
Every well-known company must maintain an Thushitharan .M is currently a student at
accurate and complete inventory of all assets in their Sri Lanka Institute of Information
Technology, pursuing his bachelor’s degree
facility. However. in Information Technology Specializing in
Cyber Security. His current research
2. Secure IoT technology implementations. interests include the Cyber Security threats
As a few of these ecosystems become linked to and mitigations in the Healthcare Sector
with emphasis on Medical Internet of
corporate servers and vulnerable to online threats, the Things and
demand. SDN.
4. FUTURE RESEARCH
The Internet of Medical Things (IoMT) is predicted to grow
rapidly in the coming years due to its ability to enhance
patient.
5. CONCLUSION
Usage of IoT devices is very important for current digital
era. Nowadays, many systems have become smarter with
the use of IoT devices.
6. ACKNOWLEDGEMENT
A researcher can get a lot of understandings about the usage
of IoT in healthcare with the emphasis of SDN and the
cyber security threats on healthcare in IoT by making a
review article. I would like to express my gratitude to my
Applied Information Assurance module lecturers and
instructors, senior students, and friends for guiding and
encouraging me in finishing this review paper within the
given time. In addition, I would like to thank for the tech
youtubers and tech bloggers and external security
researchers for the help they offered through their videos,
articles, and blogs.
7. REFERENCE
1. “Internet of Things” [Online]. Available:
https://en.wikipedia.org/wiki/Internet_of_things.
[Accessed: 03- April- 2022].