Submit your paper : editorIJETjournal@gmail.com Paper Title : Capacity Performance of LSB Method On Multi-Layer Images in Steganography ISSN : 2395-1303 Year of Publication : 2022 10.5281/zenodo.7199428 MLA Style: -Alaa Jabbar Qasim, Roshidi Din Capacity Performance of LSB Method On Multi-Layer Images in Steganography , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: - Alaa Jabbar Qasim, Roshidi Din Capacity Performance of LSB Method On Multi-Layer Images in Steganography , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract To evaluate a steganographic method and cover the variation in the data, the carrying capacity of the cover data should be addressed. In relation to this, the main purpose of steganographic method is to increase the capacity and the cover to reduce variation in data. However, since the change in capacity and cover data is inversely proportional, these two purposes cannot be achieved at the same time. As such, a multi-layer steganography is used to keep the change in the cover data constant as well as to increase the capacity. In this study, a multi-layer image steganography will be discussed and compared with the non-multilayer methods. Reference 1. Hussain, M., et al., Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 2018. 65: p. 46-66. 2. Rasmi.A, D.M.M., HIGH DATA EMBEDDING USING LSB AND PIXEL INTENSITY BASED METHODS. International Journal of Advanced Research in Computer Science and Software Engineering, 2017. 8(7). 3. Rani, N. and J. Chaudhary, Text steganography techniques: A review. International Journal of Engineering Trends and Technology (IJETT), 2013. 4(7): p. 3013-3015. 4. Qasim, A.J., et al., Review on techniques and file formats of image compression. 2020. 9(2): p. 602–610. 5. Din, R., A.J.J.B.o.E.E. Qasim, and Informatics, Steganography analysis techniques applied to audio and image files. 2019. 8(4): p. 1297–1302. 6. Din, R., et al., Review on steganography methods in multi-media domain. 2019. 8(1.7): p. 288-292. 7. Roshidi Din, O.G., Alaa Jabbar Qasim, Analytical Review on Graphical Formats Used in Image Steganographic Compression. Indonesian Journal of Electrical Engineering and Computer Science, 2018. Vol 12, No 2: p. pp. 441~446. 8. QASSIM, A.J. and Y. SUDHAKAR, Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm. 2015. 9. Altaay, A.A.J.S., Shahrin Bin Zamani, Mazdak. An introduction to image steganography techniques. in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). 2012. IEEE. 10. Altaay, A.A.J., S.B. Sahib, and M. Zamani. An introduction to image steganography techniques. in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). 2012. IEEE. 11. Zaidan, B., et al., Stego-Image Vs Stego-Analysis System. International Journal of Computer and Electrical Engineering, 2009. 1(5): p. 572. 12. Sharda, S. and S. Budhiraja, Image steganography: A review. International Journal of Emerging Technology and Advanced Engineering, 2013. 3(1): p. 707-710. 13. C.Gayathri , V.K., Study on Image Steganography Techniques International Journal of Engineering and Technology (IJET), 2013. 14. Hamid, N., et al., Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 2012. 6(3): p. 168-187. 15. Choudhary, K., Image steganography and global terrorism. International Journal of Scientific & Engineering Research, 2012. 3(4): p. 12. 16. Chanu, Y.J., K.M. Singh, and T. Tuithung, Image steganography and steganalysis: A survey. International Journal of Computer Applications, 2012. 52(2). 17. Cheddad, A., Steganoflage: A new image steganography algorithm. 2009, University of Ulster. 18. Kharrazi, M., H.T. Sencar, and N. Memon, Image steganography and steganalysis: Concepts and practice, in Mathematics And Computation In Imaging Science And Information Processing. 2007, World Scientific. p. 177-207. 19. Dhanarasi, G. and A. Prasad, Image steganography using block complexity analysis. International Journal of engineering science and technology, 2012. 4(7). 20. Cheddad, A., et al., Digital image steganography: Survey and analysis of current methods. Signal processing, 2010. 90(3): p. 727-752. 21. Raja, K., et al. A secure image steganography using LSB, DCT and compression techniques on raw images. in 2005 3rd international conference on intelligent sensing and information processing. 2005. IEEE. 22. Chandramouli, R., M. Kharrazi, and N. Memon. Image steganography and steganalysis: Concepts and practice. in International Workshop on Digital Watermarking. 2003. Springer. 23. Frączek, W., W. Mazurczyk, and K.J.J.o.U.C.S. Szczypiorski, Multi-level steganography: Improving hidden communication in networks. 2012. 18(14): p. 1967-1986. Keywords — LSB, Image steganography, PSNR, Security ,Data hiding. |