Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (MSE) value is calculated so that the quality of the cover image before and after the data hiding is evaluated.
Keywords
ISSN: 0067-2904Najeeb and Ali Journal of Science, 2017, Vol. 58, No.4B, pp: 2188-2199 98?@
IntroductionThere are many ways which play an important role with regard to information security, including the most common and well-known encryption method (Cryptography) which is change the basic data in accordance with the particular method to become illegible.Another art aims to hide the data completely is known as hiding of information (Steganography) which is a method or technique to hide data within a digital medium , so as to hide the existence of any contact or exchange of information into a cover media and is not aware of this contact only the persons concerned [1].The basic difference between encryption and steganography is that when you encrypt the information, the third party can know that there is a contact between the two parties or two destinations but he cannot understand the information because it is encrypted. In the case of hiding of information (Steganography), the third party does not know that there is something hidden or that is a contact between the two parties because it was used as an intermediary to hide this contact completely [2].
Related WorksOver the past years, information security has become the focus of many researchers who are trying to find new solutions, technologies and ideas that ensure the safe transfer of information through the network, especially the Internet, without interference. As a result, there are many techniques and methods currently used in information security. In this article we will highlight some ways to protect information.Vijay kumar [3] proposed a new algorithm of steganographic which is based on logical process for embedding MSB of secret image in to LSB of cover image which resulted in a significant improvement with lower computational complexity. A.S.Mahdi et al. [4]. designed proposed system is to hide image in image by using discrete cosine transformation method (DCT) and discrete wavelet transformation method (DWT) and Least Significant Bit (LSB). The system will embed the (input) secret image color inside a cover image color the secret image apply it discrete cosine transformation method (DCT) and ...