I.J. Image, Graphics and Signal Processing, 2015, 6, 10-18 Published Online May 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijigsp.2015.06.02 Copyright © 2015 MECS I.J. Image, Graphics and Signal Processing, 2015, 6, 10-18 A Comprehensive Image Steganography Tool using LSB Scheme Sahar A. El_Rahman Electrical Department, Faculty of Engineering-Shoubra, Benha University, Cairo, Egypt Email: sahr_ar@yahoo.com AbstractAs a consequence of the fact, transmitting data has been fast and easy these days due to the development of the Internet. Where internet is the most important medium for confidential and non-confidential communications. Security is the major matter for these communications and steganography is the art of hiding and transmitting secret messages through carriers without being exposed. This paper presents a secured model for communication using image steganography. The main concern is to create a Java-based tool called IMStego that hides information in images using Least Significant Bit (LSB) algorithm (1-LSB) and modified Least Significant one Bit algorithm, i.e. Least Significant 2 Bits algorithm (2-LSB). IMStego is a more comprehensive security utility where it provides user-friendly functionality with interactive graphical user interface and integrated navigation capabilities. It provides the user with two operations, which are hiding secret data into images and extracting hidden data from images using 1-LSB or 2- LSB algorithm. IMStego tool hides secrete information in color static images with formats BMP and PNG. Index TermsCryptography, Data Hiding, Image Steganography, Information Security, Least Significant Bit I. INTRODUCTION The growth of Internet users has raised the possibility of their data lost or modified by a third party. One of the solutions for protecting data from any potential risk is steganography. Users over the Internet nowadays are struggling with keeping their data secured against any attack done by unauthorized people during transmission. Therefore, messages that meant to be revealed only by the intended receiver could be exposed. To protect users’ data from being manipulated, steganography is used to hide their data in different types of multimedia. Since images are the most widely used medium today and human visual perception of colors is limited. Steganography is a protection method driven from Greek words that means “secret writing”. This method is used to hide secret information within other unsuspicious ones in such a way that it is impossible to detect its existence. On the other hand, cryptography is concerned about hiding the meaning of the message rather than its existence by using a process called “encryption” [1]. Table. 1 shows a comparison between steganography and cryptography. Table 1. Steganography vs. Cryptography. Steganography Cryptography Definition Hiding the existence of the message Hiding the meaning of the message Carrier Any digital media Usually text based Key Optional Necessary Objective Secrete communication Data protection Visibility Never Always Fails when Detected De-ciphered Security is the major matter for the communications over of the internet and steganography is most widely recognized tool for information security [2]. Steganography is the process of hiding information in such a way that prevents the detection of hidden messages. In this technique, no one apart from the sender and the intended recipient even realize that there is a hidden message [3]. it hides a secret message within cover medium such as image, video, text, audio [4]. There are two major types of steganography throughout history, technical and linguistic. Technical steganography is more based upon scientific methods of hiding information while linguistic employs more creative and non-apparent methods [5]. Steganography systems can be grouped by the type of covers used (graphics, sound, text, executable) or by the techniques used to modify the covers [4][6][7]. In image steganography, the cover media is the cover image and the stegomedia is the stegoimage. The images can be manipulated in either spatial domain or frequency domain and accordingly there are two main classes into which the steganography techniques may be divided [8]. There are two directions of steganography (as shown in Fig. 1) protection against detection and protection against removal. The first direction aims to prevent the message from being detected by any unauthorized third party. The second direction is called “document marking” which consist of two branches: “watermarking” that hides trademarks into images, music and other types of multimedia and “fingerprinting” which are hidden serial numbers that enable the owner of an intellectual property to know the costumer who has broken his license agreement [9].