Loading

Comparison of LSB Steganography in BMP and JPEG Images
Eltyeb E. A bed Elgabar
Eltyeb E. Abed Elgabar, Information Technology, King Abdul Aziz University, Jeddah, Saudi Arabia.
Manuscript received on October 20, 2013. | Revised Manuscript received on November 01, 2013. | Manuscript published on November 05, 2013. | PP: 91-95 | Volume-3 Issue-5, November 2013. | Retrieval Number: E1900113513/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The literature on information security has to consider innovative and continuously developing ways of protecting data from infiltration taking into consideration the speed of the processors and the cryptanalysis. New steganographical technologies have been created to provide security with or without data encryption including data hiding. Etymologically, the term „steganography‟, which means „covered writing‟, originates from the Greek words “stegos” (cover), and “grafia” (writing). Steganography operates to conceal a secret message rooted in various forms of media including image, video, audio, and text. The domain of information hiding utilizes several algorithms. The easiest and widely known technique is Least Significant Bit (LSB). This paper compares and analyses Least Significant Bit algorithm using the cover object as an image with a focus on two types: BMP and JPEG. The comparison and analysis are done with respect to a number of criteria to understand their strengths and weaknesses.
Keywords: Robustness, Steganalysis, Steganography, Steganographic, Unsuspicious.