International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 4 885 – 889 _______________________________________________________________________________________________ 885 IJRITCC | April 2014, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Implementation and Performance Analysis of LSB Based Steganography Prof. Arjun R. Nichal Departement of ETC AITRC Vita Vita, India arjunnichal@gmail.com Mr. Abhinav C. Gorle Departement of ETC AITRC Vita Vita, India gorleabhinav@gmail.com Mr. Nitin S. Chavan Departement of ETC AITRC Vita Vita, India chavan_nitin90@yahoo.in Ms. Rohini R. Kondhalkar Departement of ETC AITRC Vita Vita, India rohinikondalkar27@gmail.com Abstract—Protecting privacy for exchanging information through the media has been a topic researched by many people. Up to now, cryptography has always had its ultimate role in protecting the secrecy between the sender and the intended receiver. How- ever, nowadays steganography techniques are used increasingly besides cryptography to add more protective layer to the hidden data. Keywords- Steganography, Data Hiding, LSB Substitution, ) __________________________________________________*****_________________________________________________ I. INTRODUCTION Information hiding in digital images has drawn much attention in recent years. Secret message encrypted and em- bedded in digital cover media. The redundancy of digital me- dia as well as characteristics of human visual system makes it possible to hide secret messages. Two competing aspects are considered while designing information hiding scheme 1) Hid- ing capacity and 2) Imperceptibility. Hiding capacity means maximum payload. Imperceptibility means keeping undetecta- ble. A least significant bits (LSB) substitution method is wide- ly used for hiding data in digital images. This method widely used because of large capacity and easy implementation. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement is called steganography. It is the art and science of invisible communication. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. Steganographic messages are often first encrypted by some traditional means, and then a cover text is modified in some way to contain the encrypted message, resulting in stego text. This is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, with a reversible manner so that the original cover content can be perfectly res- tored after extraction of the hidden message. II. IMPLEMENTATION OF STEGANOGRAPHY METHOD 1) Image Method In Image method we hide an image in another image. In this method we hide the data inside another image. This Purpose we use the Grayscale images as an Input and the Bi- nary Secret image data. In this we can transmit the hidden data that is encrypted secret data inside the cover image and the receiver using the decryption method we decrypt the data and recover the secret image/data as well as the cover/input image. 1.1 Image Transmitter: Fig1.1: Block diagram of image transmitter Cover image: Cover image is simply a grayscale image used for hiding our secret image/message. This images have in various formats like BMP, GIF and PNG etc. Cover image is pre- process, and the secret message/text is hide by using LSB (Least significant bit) substitution. Pre-processing: Before an embedding of secret message into cover image, the cover image is pre-processed for denoising an im- age. Image denoising is an important step in pre-processing of Images. Thresholding is applied to remove the noise without blurring edges. Gaussian filter, anisotropic PDE, wavelets are some important denoising techniques. These denoising tech- niques can reduce noise without destroying edges in an image. So edge information is preserved and noise is well attenuated. Secret image Encrypted secret im- age Message embedding block Stego image Pre- processing Cover image Secret key Embedding bit