{"title":"Survey on LSB Data hiding techniques","authors":"Aakaash Jois, L. Tejaswini","doi":"10.1109/WISPNET.2016.7566214","DOIUrl":null,"url":null,"abstract":"Digital Communication has become an essential part of real world applications. Lot of applications are internet based and in some cases, it is desirable for the communication to be carried out in secret. Information hiding is a technique of hiding a secret/confidential data into a host medium in such a way that the hidden data is imperceptible, but known by the intended recipient. In this paper, Data hiding techniques using various Least Significant Bit (LSB) Substitution Techniques are explored. A comparative analysis is made using 4 different LSB substitution methods, Simple LSB Substitution, Fibonacci Decomposition LSB Substitution, Prime Number Decomposition LSB Substitution and Natural Number Decomposition LSB Substitution. The advantages and disadvantages of each method over the previous is expressed in this paper.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISPNET.2016.7566214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Digital Communication has become an essential part of real world applications. Lot of applications are internet based and in some cases, it is desirable for the communication to be carried out in secret. Information hiding is a technique of hiding a secret/confidential data into a host medium in such a way that the hidden data is imperceptible, but known by the intended recipient. In this paper, Data hiding techniques using various Least Significant Bit (LSB) Substitution Techniques are explored. A comparative analysis is made using 4 different LSB substitution methods, Simple LSB Substitution, Fibonacci Decomposition LSB Substitution, Prime Number Decomposition LSB Substitution and Natural Number Decomposition LSB Substitution. The advantages and disadvantages of each method over the previous is expressed in this paper.