New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check

Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload cap...

Full description

Saved in:
Bibliographic Details
Published inSadhana (Bangalore) Vol. 43; no. 5; pp. 1 - 14
Main Authors Cem kasapbaşi, Mustafa, Elmasry, Wisam
Format Journal Article
LanguageEnglish
Published New Delhi Springer India 01.05.2018
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0256-2499
0973-7677
DOI10.1007/s12046-018-0848-4

Cover

Abstract Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload capacity, posses integrity check and security with cryptography at the same time. Proposed work supports many different formats as payload. In the proposed method, the codeword is firstly formed with secret data and its CRC-32 checksum, then the codeword is compressed by Gzip just before encrypting it by AES, and it is finally added to encrypted header information for further process and then embedded into the cover image. Embedding the encrypted data and header information process utilizes Fisher-Yates Shuffle algorithm for selecting next pixel location. To hide one byte, different LSB (least significant bits) of all colour channels of the selected pixel is exploited. In order to evaluate the proposed method, comparative performance tests are carried out against different spatial image steganographic techniques using some of the well-known image quality metrics. For security analysis, histogram, enhanced LSB and Chi-square analyses are carried out. The results indicate that with the proposed method has an improved payload capacity, security and integrity check for common problems of simple LSB method. Moreover, it has been shown that the proposed method increases the visual quality of the stego image when compared to other studied methods, and makes the secret message difficult to be discovered.
AbstractList Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload capacity, posses integrity check and security with cryptography at the same time. Proposed work supports many different formats as payload. In the proposed method, the codeword is firstly formed with secret data and its CRC-32 checksum, then the codeword is compressed by Gzip just before encrypting it by AES, and it is finally added to encrypted header information for further process and then embedded into the cover image. Embedding the encrypted data and header information process utilizes Fisher-Yates Shuffle algorithm for selecting next pixel location. To hide one byte, different LSB (least significant bits) of all colour channels of the selected pixel is exploited. In order to evaluate the proposed method, comparative performance tests are carried out against different spatial image steganographic techniques using some of the well-known image quality metrics. For security analysis, histogram, enhanced LSB and Chi-square analyses are carried out. The results indicate that with the proposed method has an improved payload capacity, security and integrity check for common problems of simple LSB method. Moreover, it has been shown that the proposed method increases the visual quality of the stego image when compared to other studied methods, and makes the secret message difficult to be discovered.
ArticleNumber 68
Author Elmasry, Wisam
Cem kasapbaşi, Mustafa
Author_xml – sequence: 1
  givenname: Mustafa
  surname: Cem kasapbaşi
  fullname: Cem kasapbaşi, Mustafa
  email: mckasapbasi@ticaret.edu.tr
  organization: Department of Computer Engineering, Istanbul Commerce University
– sequence: 2
  givenname: Wisam
  surname: Elmasry
  fullname: Elmasry, Wisam
  organization: Department of Computer Engineering, Istanbul Commerce University
BookMark eNp9kEFv1DAQhS1UJNrCD-BmiSumYycbO0eoKFRawaHt2Zo4403K1g62Vyjiz9dlkZCQ4OSx5n1vZt4ZOwkxEGOvJbyTAPoiSwVtJ0AaAaY1on3GTqHXjdCd1ie1VptOqLbvX7CznO8BlAbTnLKfX-gH3958EANmGrmL-3hIfH7AHfFcaIch7hIu08ofqExx5CVyChMGR7xMxMn72c0U3MrnwBdc9xGrDS7o5rK-5ZncIdWKYxirojr--rmJ3LeX7LnHfaZXv99zdnf18fbys9h-_XR9-X4rXCO7IkZllGsbaXoYxwYa8HLjfQ_YDh2aDcCga8sMEo3aSHKd91Qb46BbZ3qDzTl7c_RdUvx-oFzsfT0y1JFWQSN1p7reVJU-qlyKOSfytl6AZY6hJJz3VoJ9Stoek7Y1afuUtG0rKf8il1QTTOt_GXVkctWGHaU_O_0begQl4ZOF
CitedBy_id crossref_primary_10_1117_1_JEI_31_3_033021
crossref_primary_10_1007_s11042_023_16975_6
crossref_primary_10_4018_IJISP_2022010118
crossref_primary_10_1109_ACCESS_2023_3237393
crossref_primary_10_1515_jisys_2018_0225
crossref_primary_10_3390_e23030273
crossref_primary_10_1155_2022_1870136
crossref_primary_10_3390_sym14071325
crossref_primary_10_3390_s23063288
crossref_primary_10_1080_15325008_2024_2346830
crossref_primary_10_1007_s11042_020_09162_4
crossref_primary_10_1051_bioconf_20249700069
crossref_primary_10_1109_ACCESS_2019_2946807
crossref_primary_10_1016_j_epsr_2022_107834
crossref_primary_10_3390_jsan11040066
crossref_primary_10_1007_s13369_022_07030_x
Cites_doi 10.1109/TIFS.2010.2041812
10.1109/5.771065
10.1049/ip-vis:20059022
10.1109/RAECS.2014.6799604
10.1016/S0167-8655(02)00402-6
10.1109/JRPROC.1961.287814
10.1016/j.patcog.2003.08.007
10.14445/22312803/IJCTT-V15P122
10.1016/j.jisa.2016.07.001
10.1016/j.sigpro.2009.08.010
10.1109/CISP.2010.5646724
10.1145/1947940.1948038
10.1109/MWSCAS.2003.1562601
10.1007/978-81-322-2538-6_53
10.1109/TMM.2004.827493
10.1109/COMST.2014.2350994
10.1109/93.959097
10.1145/2905055.2905294
ContentType Journal Article
Copyright Indian Academy of Sciences 2018
Copyright Springer Science & Business Media 2018
Copyright_xml – notice: Indian Academy of Sciences 2018
– notice: Copyright Springer Science & Business Media 2018
DBID AAYXX
CITATION
DOI 10.1007/s12046-018-0848-4
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 0973-7677
EndPage 14
ExternalDocumentID 10_1007_s12046_018_0848_4
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.VR
06D
0R~
0VY
123
1N0
203
28-
29P
29~
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2WC
2~H
30V
4.4
406
408
40D
40E
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABDBF
ABDZT
ABECU
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABLLD
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACUHS
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
C1A
CAG
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
E3Z
EAD
EAP
EBLON
EBS
EIOEI
EJD
EOJEC
ESBYG
ESX
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GROUPED_DOAJ
H13
HG5
HG6
HMJXF
HRMNR
HVGLF
HZ~
I-F
IJ-
IKXTQ
IWAJR
IXD
I~X
I~Z
J-C
J0Z
JBSCW
JZLTJ
KOV
KQ8
LLZTM
M4Y
MA-
MK~
N2Q
NDZJH
NF0
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OBODZ
OK1
P19
P2P
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RAB
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TR2
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
XSB
YLTOR
Z45
Z7R
Z7S
Z7X
Z7Z
Z83
Z86
Z88
Z8M
Z8N
Z8R
Z8T
Z8W
Z92
ZMTXR
_50
~8M
~A9
~EX
AAPKM
AAYXX
ABDBE
ABRTQ
ADHKG
AFDZB
AFOHR
AGQPQ
AHPBZ
ATHPR
CITATION
OVT
ID FETCH-LOGICAL-c316t-d282c431890dd3030f15ff90a4b6a8500b78908b1a8251ec6ffe6a8db74c898a3
IEDL.DBID U2A
ISSN 0256-2499
IngestDate Thu Sep 25 00:41:56 EDT 2025
Wed Oct 01 05:55:10 EDT 2025
Thu Apr 24 23:02:36 EDT 2025
Fri Feb 21 02:42:14 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords pseudo-random encoding
AES encryption
CRC-32 Checksum
image steganography
Gzip compression
Three bit LSB
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-d282c431890dd3030f15ff90a4b6a8500b78908b1a8251ec6ffe6a8db74c898a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2031762698
PQPubID 2043821
PageCount 14
ParticipantIDs proquest_journals_2031762698
crossref_citationtrail_10_1007_s12046_018_0848_4
crossref_primary_10_1007_s12046_018_0848_4
springer_journals_10_1007_s12046_018_0848_4
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-05-01
PublicationDateYYYYMMDD 2018-05-01
PublicationDate_xml – month: 05
  year: 2018
  text: 2018-05-01
  day: 01
PublicationDecade 2010
PublicationPlace New Delhi
PublicationPlace_xml – name: New Delhi
– name: Dordrecht
PublicationSubtitle Published by the Indian Academy of Sciences
PublicationTitle Sadhana (Bangalore)
PublicationTitleAbbrev Sādhanā
PublicationYear 2018
Publisher Springer India
Springer Nature B.V
Publisher_xml – name: Springer India
– name: Springer Nature B.V
References DadgostarHAFsariFImage steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSBJournal of Information Security and Applications (JISA).2016309410410.1016/j.jisa.2016.07.001
JainMLenkaSKA Review of Digital Image Steganography using LSB and LSB ArrayInternational Journal of Applied Engineering Research201611318201824
ChanC-KChengL-MHiding data in images by simple LSB substitutionPattern Recognition20043746947410.1016/j.patcog.2003.08.0071072.68534
DaemenJRijmenVRijndael: the advanced encryption standardDr. Dobb’s Journal.200126031371391065.94005
Stanley C A Pairs of Values and the Chi-Squared Attackhttps://orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. Accessed on Jan 2018.
Gailly J-L and Adler M Gzip Home Page. http://www.gzip.org/. Accessed on Jan 2018
WuH-CWuNITsaiCSHwangMSImage steganographic scheme based on pixel-value differencing and LSB replacement methodsIEE Proceedings Vision, Image and Signal Processing200515261161510.1049/ip-vis:20059022
Bashardoost M, Sulong G B and Gerami P 2013 Enhanced LSB image steganography method by using knight tour algorithm, vigenere encryption and LZW Compression. Int. J. Comput. Sci. Iss. (IJCSI) 10(2) 1: 221–227
WuD-ATsaiW-HA steganographic method for images by pixel-value differencingPattern Recognition Letters2003249–101613162610.1016/S0167-8655(02)00402-61048.68040
Sasivarnan C, Jagan A, Kaur J, Jyoti D and Rao D S 2011 Image quality assessment techniques in spatial domain. Int. J. Comput. Sci. Technol (IJCST) 2(3): 177–184
WangSYangBNiuXA Secure Steganography Method based on Genetic AlgorithmJournal of Information Hiding and Multimedia Signal Processing2010112835
LiBHeJHuangJShiYQA Survey on Image Steganography and SteganalysisJournal of Information Hiding and Multimedia Signal Processing201122142172
SahmoudSElmasryWAbudalfaS“Enhancement the security of AES against modern attacks by using Variable key block cipherInternational Arab Journal of e-Technology (IAJeT).2013311726
LouD-CSungC-HA steganographic scheme for secure communications based on the chaos and Euler TheoremIEEE Transactions on Multimedia.20046350150910.1109/TMM.2004.827493
KukapalliVRRaoTBReddyBSImage steganograpghy by enhanced pixel indicator method using most significant bit (MSB) compareInternational Journal of Computer Trends and Technology20141539710110.14445/22312803/IJCTT-V15P122
Singla D and Juneja M 2014 An analysis of edge based image steganography techniques in spatial domain. In: Recent Advances in Engineering and Computer Sciences (RAECS) 1–5
FisherRAYatesFStatistical tables for biological, agricultural and medical research1948LondonOliver & Boyd26270030.31503
MazurczykWCaviglioneLSteganography in Modern Smartphones and Mitigation TechniquesIEEE Communications Surveys and Tutorials201517133435710.1109/COMST.2014.2350994
Chen Y, Han Z, Li S, Lu C and Yao X H 2010 An adaptive steganography algorithm based on block sensitivity vectors using HVS features.In: 3rd International Congress in Image and Signal Processing. 1151–1155
Trivedi M C Sharma S and Yadav V K 2016 Analysis of several image steganography techniques in spatial domain: a survey. In; Second International Conference on Information and Communication Technology for Competitive Strategies (ICTCS ‘16). ACM. Article 84
CheddadACondellJCurranKMcKevittPDigital image steganography: Survey and analysis of current methodsSignal Processing201090372775210.1016/j.sigpro.2009.08.0101177.94138
PetitcolasFAPAndersonRJKuhnMGInformation hiding-a surveyProc. IEEE.19998771062107810.1109/5.771065
LuoWHuangFHuangJEdge Adaptive Image Steganography Based on LSB Matching RevisitedIEEE Transactions on Information Forensics and Security20105220121410.1109/TIFS.2010.2041812
PetersonWWBrownDTCyclic codes for error detectionProceedings of the IRE196149122823512801110.1109/JRPROC.1961.287814
Al-Hawi T, Al-Qutayri M and Barada H 2003 A testbed for evaluating security and robustness of steganography techniques. In: IEEE 46th Midwest Symposium in Circuits and Systems. 3: 1583–1586
Anand J V and Dharaneetharan G D 2011 New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. Proceedings of the 2011 In: International Conference on Communication, Computing 474–476
DigheDGand KapaleNDRandom Insertion Using Data Parity Steganography TechniqueInternational Journal of Engineering Science and Innovative Technology (IJESIT)201322364368
Wikipedia Cyclic redundancy check. https://en.wikipedia.org/wiki/Cyclic_redundancy_check. Accessed on Jan 2018
Akhtar N 2016 An LSB substitution with bit inversion steganography method. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics 43: 515–521
FridrichJGoljanMDuRDetecting LSB steganography in colour and gray-scale imagesIEEE Transactions on Multimedia200184222810.1109/93.959097
848_CR30
W Mazurczyk (848_CR3) 2015; 17
848_CR1
RA Fisher (848_CR24) 1948
J Daemen (848_CR20) 2001; 26
A Cheddad (848_CR27) 2010; 90
848_CR18
B Li (848_CR28) 2011; 2
848_CR17
S Sahmoud (848_CR19) 2013; 3
D-A Wu (848_CR8) 2003; 24
848_CR13
J Fridrich (848_CR15) 2001; 8
848_CR10
WW Peterson (848_CR16) 1961; 49
FAP Petitcolas (848_CR2) 1999; 87
S Wang (848_CR23) 2010; 1
C-K Chan (848_CR7) 2004; 37
VR Kukapalli (848_CR11) 2014; 15
W Luo (848_CR22) 2010; 5
D Dighe (848_CR12) 2013; 2
D-C Lou (848_CR21) 2004; 6
M Jain (848_CR29) 2016; 11
848_CR4
HA Dadgostar (848_CR14) 2016; 30
848_CR5
848_CR26
848_CR25
H-C Wu (848_CR9) 2005; 152
848_CR6
References_xml – reference: KukapalliVRRaoTBReddyBSImage steganograpghy by enhanced pixel indicator method using most significant bit (MSB) compareInternational Journal of Computer Trends and Technology20141539710110.14445/22312803/IJCTT-V15P122
– reference: FisherRAYatesFStatistical tables for biological, agricultural and medical research1948LondonOliver & Boyd26270030.31503
– reference: Wikipedia Cyclic redundancy check. https://en.wikipedia.org/wiki/Cyclic_redundancy_check. Accessed on Jan 2018
– reference: Al-Hawi T, Al-Qutayri M and Barada H 2003 A testbed for evaluating security and robustness of steganography techniques. In: IEEE 46th Midwest Symposium in Circuits and Systems. 3: 1583–1586
– reference: Akhtar N 2016 An LSB substitution with bit inversion steganography method. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics 43: 515–521
– reference: LouD-CSungC-HA steganographic scheme for secure communications based on the chaos and Euler TheoremIEEE Transactions on Multimedia.20046350150910.1109/TMM.2004.827493
– reference: Bashardoost M, Sulong G B and Gerami P 2013 Enhanced LSB image steganography method by using knight tour algorithm, vigenere encryption and LZW Compression. Int. J. Comput. Sci. Iss. (IJCSI) 10(2) 1: 221–227
– reference: PetersonWWBrownDTCyclic codes for error detectionProceedings of the IRE196149122823512801110.1109/JRPROC.1961.287814
– reference: LuoWHuangFHuangJEdge Adaptive Image Steganography Based on LSB Matching RevisitedIEEE Transactions on Information Forensics and Security20105220121410.1109/TIFS.2010.2041812
– reference: WuD-ATsaiW-HA steganographic method for images by pixel-value differencingPattern Recognition Letters2003249–101613162610.1016/S0167-8655(02)00402-61048.68040
– reference: Anand J V and Dharaneetharan G D 2011 New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. Proceedings of the 2011 In: International Conference on Communication, Computing 474–476
– reference: DadgostarHAFsariFImage steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSBJournal of Information Security and Applications (JISA).2016309410410.1016/j.jisa.2016.07.001
– reference: Chen Y, Han Z, Li S, Lu C and Yao X H 2010 An adaptive steganography algorithm based on block sensitivity vectors using HVS features.In: 3rd International Congress in Image and Signal Processing. 1151–1155
– reference: Singla D and Juneja M 2014 An analysis of edge based image steganography techniques in spatial domain. In: Recent Advances in Engineering and Computer Sciences (RAECS) 1–5
– reference: FridrichJGoljanMDuRDetecting LSB steganography in colour and gray-scale imagesIEEE Transactions on Multimedia200184222810.1109/93.959097
– reference: Stanley C A Pairs of Values and the Chi-Squared Attackhttps://orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. Accessed on Jan 2018.
– reference: Gailly J-L and Adler M Gzip Home Page. http://www.gzip.org/. Accessed on Jan 2018
– reference: JainMLenkaSKA Review of Digital Image Steganography using LSB and LSB ArrayInternational Journal of Applied Engineering Research201611318201824
– reference: PetitcolasFAPAndersonRJKuhnMGInformation hiding-a surveyProc. IEEE.19998771062107810.1109/5.771065
– reference: MazurczykWCaviglioneLSteganography in Modern Smartphones and Mitigation TechniquesIEEE Communications Surveys and Tutorials201517133435710.1109/COMST.2014.2350994
– reference: SahmoudSElmasryWAbudalfaS“Enhancement the security of AES against modern attacks by using Variable key block cipherInternational Arab Journal of e-Technology (IAJeT).2013311726
– reference: WuH-CWuNITsaiCSHwangMSImage steganographic scheme based on pixel-value differencing and LSB replacement methodsIEE Proceedings Vision, Image and Signal Processing200515261161510.1049/ip-vis:20059022
– reference: DigheDGand KapaleNDRandom Insertion Using Data Parity Steganography TechniqueInternational Journal of Engineering Science and Innovative Technology (IJESIT)201322364368
– reference: LiBHeJHuangJShiYQA Survey on Image Steganography and SteganalysisJournal of Information Hiding and Multimedia Signal Processing201122142172
– reference: CheddadACondellJCurranKMcKevittPDigital image steganography: Survey and analysis of current methodsSignal Processing201090372775210.1016/j.sigpro.2009.08.0101177.94138
– reference: WangSYangBNiuXA Secure Steganography Method based on Genetic AlgorithmJournal of Information Hiding and Multimedia Signal Processing2010112835
– reference: Trivedi M C Sharma S and Yadav V K 2016 Analysis of several image steganography techniques in spatial domain: a survey. In; Second International Conference on Information and Communication Technology for Competitive Strategies (ICTCS ‘16). ACM. Article 84
– reference: ChanC-KChengL-MHiding data in images by simple LSB substitutionPattern Recognition20043746947410.1016/j.patcog.2003.08.0071072.68534
– reference: Sasivarnan C, Jagan A, Kaur J, Jyoti D and Rao D S 2011 Image quality assessment techniques in spatial domain. Int. J. Comput. Sci. Technol (IJCST) 2(3): 177–184
– reference: DaemenJRijmenVRijndael: the advanced encryption standardDr. Dobb’s Journal.200126031371391065.94005
– volume: 5
  start-page: 201
  issue: 2
  year: 2010
  ident: 848_CR22
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2010.2041812
– volume: 87
  start-page: 1062
  issue: 7
  year: 1999
  ident: 848_CR2
  publication-title: Proc. IEEE.
  doi: 10.1109/5.771065
– volume: 152
  start-page: 611
  year: 2005
  ident: 848_CR9
  publication-title: IEE Proceedings Vision, Image and Signal Processing
  doi: 10.1049/ip-vis:20059022
– ident: 848_CR13
– volume: 2
  start-page: 364
  issue: 2
  year: 2013
  ident: 848_CR12
  publication-title: International Journal of Engineering Science and Innovative Technology (IJESIT)
– volume: 2
  start-page: 142
  issue: 2
  year: 2011
  ident: 848_CR28
  publication-title: Journal of Information Hiding and Multimedia Signal Processing
– ident: 848_CR17
– ident: 848_CR4
  doi: 10.1109/RAECS.2014.6799604
– volume: 24
  start-page: 1613
  issue: 9–10
  year: 2003
  ident: 848_CR8
  publication-title: Pattern Recognition Letters
  doi: 10.1016/S0167-8655(02)00402-6
– volume: 49
  start-page: 228
  issue: 1
  year: 1961
  ident: 848_CR16
  publication-title: Proceedings of the IRE
  doi: 10.1109/JRPROC.1961.287814
– volume: 37
  start-page: 469
  year: 2004
  ident: 848_CR7
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2003.08.007
– start-page: 26
  volume-title: Statistical tables for biological, agricultural and medical research
  year: 1948
  ident: 848_CR24
– volume: 15
  start-page: 97
  issue: 3
  year: 2014
  ident: 848_CR11
  publication-title: International Journal of Computer Trends and Technology
  doi: 10.14445/22312803/IJCTT-V15P122
– ident: 848_CR26
– volume: 30
  start-page: 94
  year: 2016
  ident: 848_CR14
  publication-title: Journal of Information Security and Applications (JISA).
  doi: 10.1016/j.jisa.2016.07.001
– volume: 26
  start-page: 137
  issue: 03
  year: 2001
  ident: 848_CR20
  publication-title: Dr. Dobb’s Journal.
– volume: 90
  start-page: 727
  issue: 3
  year: 2010
  ident: 848_CR27
  publication-title: Signal Processing
  doi: 10.1016/j.sigpro.2009.08.010
– ident: 848_CR6
  doi: 10.1109/CISP.2010.5646724
– ident: 848_CR10
  doi: 10.1145/1947940.1948038
– ident: 848_CR30
  doi: 10.1109/MWSCAS.2003.1562601
– ident: 848_CR18
– ident: 848_CR5
  doi: 10.1007/978-81-322-2538-6_53
– volume: 3
  start-page: 17
  issue: 1
  year: 2013
  ident: 848_CR19
  publication-title: International Arab Journal of e-Technology (IAJeT).
– volume: 11
  start-page: 1820
  issue: 3
  year: 2016
  ident: 848_CR29
  publication-title: International Journal of Applied Engineering Research
– ident: 848_CR25
– volume: 6
  start-page: 501
  issue: 3
  year: 2004
  ident: 848_CR21
  publication-title: IEEE Transactions on Multimedia.
  doi: 10.1109/TMM.2004.827493
– volume: 17
  start-page: 334
  issue: 1
  year: 2015
  ident: 848_CR3
  publication-title: IEEE Communications Surveys and Tutorials
  doi: 10.1109/COMST.2014.2350994
– volume: 1
  start-page: 28
  issue: 1
  year: 2010
  ident: 848_CR23
  publication-title: Journal of Information Hiding and Multimedia Signal Processing
– volume: 8
  start-page: 22
  issue: 4
  year: 2001
  ident: 848_CR15
  publication-title: IEEE Transactions on Multimedia
  doi: 10.1109/93.959097
– ident: 848_CR1
  doi: 10.1145/2905055.2905294
SSID ssj0027083
Score 2.375216
Snippet Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Color
Cryptography
Embedding
Encryption
Engineering
Image enhancement
Image quality
Integrity
Performance tests
Pixels
Steganography
Title New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check
URI https://link.springer.com/article/10.1007/s12046-018-0848-4
https://www.proquest.com/docview/2031762698
Volume 43
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 0973-7677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0027083
  issn: 0256-2499
  databaseCode: KQ8
  dateStart: 19780701
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 0973-7677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0027083
  issn: 0256-2499
  databaseCode: KQ8
  dateStart: 20000101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 0973-7677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0027083
  issn: 0256-2499
  databaseCode: ABDBF
  dateStart: 20060601
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 0973-7677
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0027083
  issn: 0256-2499
  databaseCode: ADMLS
  dateStart: 20060601
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 0973-7677
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0027083
  issn: 0256-2499
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 0973-7677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0027083
  issn: 0256-2499
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9tAEB5RcmkPCGirhgKaA4e-VtrYjr0-JpQQQdtLG4merH14AdGaKAmn_nlm7HVdEEXiZFn7OPjbnfnGu_MNwEE8SH2WZpGw0iqRWDMQJslSYXTsWSfWKsmJwl-_pdNZcnI2PAt53Mv2tnt7JFlb6i7ZjcZy9MuKyvwX7Bn0hqzmRYt4Fo26KEs22pvkywXFFnl7lPnQFHedUccw7x2K1r5msgkbgSTiqEF1C9bKahte_CMduA1bYVMu8V1Qjn7_Ev6QycIv38eCfZNDFqS-WeDlb7IZSGie6yoIVGNTOBpX11hWFww8EhHEstaT4GRMvKxwzsG8pmnIn1oi659wGYrdoa4cNkIT_Ea426tXMJsc_TicilBdQVgCaCUcBVuW6IPKpXPkyKQfDL3PpU5MqtVQSsM5ssoMNGe3ljb1vqQGZ7LEqlzp-DWsV9dV-QbQR3FMvtZHTsWJowAmc0pHsSG2I5XVvg-y_cyFDdLjXAHjV9GJJjMyBSFTMDJF0ocPf4fMG92NxzrvttgVYQsui4jMFVn6NFd9-Nji2TX_d7KdJ_V-C8-jej3xFchdWF8tbso9oikrsw-90fjzeMLP45-nR_v1Mr0FBIHhNg
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB6V5QA9tIWCui0tc-BAH0beJJs4R1pBl7Jw6SLRU-RHDIg2IDZ7af98ZzZOQ1GLxDHyQ449nm_G9nwDsBUPUp-lWSSstEok1gyESbJUGB175om1SnKg8NFxOjpJvpwOT0Mc97R97d5eSc41dRfsRm3Z-2VGZT4FW4DFhPyTqAeLu5-_He51fpZs2DcJzQV5F3l7mfmvTv6Go87GvHMtOkeb_acwacfZPDK53JnVZsf-vEPh-MAfeQZPgvWJu424rMCjslqFx7c4CVdhJez2KW4HSuq3z-EX6UIcf_0oGPQcMtP17AYvfpAyQhKTM10F5mtsMlJjfYVldc4ShWRhYjknquAoT7yo8JpPCTR1Q0BtyQv4gNOQRQ915bBhsOAvEih7uQYn-3uTTyMR0jYISytfC0denCW7ROXSOUJI6QdD73OpE5NqNZTScPCtMgPNYbOlTb0vqcCZLLEqVzpeh151VZUvAH0UxwTiPnIqThx5RplTOooNmVFSWe37INvVK2zgNOfUGt-Ljo2ZJ7ugyS54soukD-_-NLluCD3uq7zRikQR9va0iEgPEoSkuerD-3aFu-L_dvbyQbU3YWk0ORoX44Pjw1ewHM3Fhd9ZbkCvvpmVr8kWqs2bIPu_AeDr_eE
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB5RkKpyQEBbsTzn0ENLa603ySbOESgr2lJUqV2JW-RHDAgIKzac-PPMbJymRS0Sx8jOHPKN55HxfAPwLh6kPkuzSFhplUisGQiTZKkwOvbME2uV5Ebh7yfp0Tj5ejo8DXNOp-1t97Yk2fQ0MEtTVfcnzve7xjeSw5kwsyvzH7EXsJAwTwIp9Dja6zIu2fBwkl8XlGfkbVnzXyL-dkxdtPmoQDrzO6NlWAoBI-41CK_AXFmtwuIfNIKrsBIO6BTfBxbpD6_hnswXHv_cF-ynHDI59d0tXlyT_UBC9kxXgawamyHSWN9gWZ2zEiAFhVjOuCW4MRMvKpxwYq9JDPlWS4H7J5yGwXeoK4cN6QQ_kQ7YyzcwHh3-OjgSYdKCsARWLRwlXpZCCZVL58ipST8Yep9LnZhUq6GUhvtllRlo7nQtbep9SQvOZIlVudLxW5ivbqpyDdBHcUx-10dOxYmjZCZzSkexochHKqt9D2T7mQsbaMh5GsZV0REoMzIFIVMwMkXSg93fr0waDo6nNm-22BXhOE6LiEwXWf00Vz342OLZLf9X2Pqzdu_Ayx-fR8Xxl5NvG_AqmqkW34zchPn69q7couilNtszDX0AqkzlWA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=New+LSB-based+colour+image+steganography+method+to+enhance+the+efficiency+in+payload+capacity%2C+security+and+integrity+check&rft.jtitle=Sadhana+%28Bangalore%29&rft.au=Cem+kasapba%C5%9Fi%2C+Mustafa&rft.au=Elmasry%2C+Wisam&rft.date=2018-05-01&rft.pub=Springer+India&rft.issn=0256-2499&rft.eissn=0973-7677&rft.volume=43&rft.issue=5&rft_id=info:doi/10.1007%2Fs12046-018-0848-4&rft.externalDocID=10_1007_s12046_018_0848_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0256-2499&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0256-2499&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0256-2499&client=summon