International Journal of Electronics and Computer Applications

Volume: 2 Issue: 1

  • Open Access
  • Original Article

LSB Steganography: A Key to Effectual Encryption and Decryption

Pallavi Shejwal1∗, Riddhi Salla2, Shital Sanap2, Arya Baride2, Pratik Patil2

1Assistant Professor, Department of Information Technology, Modern College of Engineering, Shivajinagar, Pune, Maharashtra, India
2Student, B.E. Information Technology, Department of Information Technology, Modern College of Engineering, Shivajinagar, Pune, Maharashtra, India

Corresponding author. Email: [email protected]

Year: 2025, Page: 83-89, Doi: https://doi.org/10.70968/ijeaca.v2i1.D1003

Received: Feb. 2, 2025 Accepted: June 25, 2025 Published: July 12, 2025

Abstract

Steganography is an ancient process used in secrecy and has found new relevance in the modern digital era. In our day-to-day life, we rely on digital media for our personal and professional online communication, the need to protect sensitive information gains paramount importance 1. The threats to hacking of sensitive data in the form of text, image and audio which may lead to heavy financial losses call for innovative and sophisticated methods to ensure encrypted end to end communication, protecting information from unauthorized access. In this regard, the challenge lies in encrypting and decrypting data securely when sending over communication media. Conventional encryption methods may not be full proof to handle new ways of data hacking techniques. Steganography has emerged as a suitable solution which enables the concealment of information which is in the form of image, text, audio and video. Conventional techniques may not fully address the challenges in a wide range of digital communication, necessitating the development of advanced methodologies. A lot of research work has been done in the domain of Security. The LSB Steganography technique has relevant features that collectively enhance its scope and applicability in a wide range of communication. This paper presents enhanced LSB steganography technique to encrypt and decrypt text, image and audio files successfully.

Keywords: LSB Steganography: A Key to Effectual Encryption and Decryption

References

  1. Provos N, Honeyman P. Detecting Steganographic Content on the Internet. 2002. Available from: https://www.researchgate.net/publication/2379632_Detecting_Steganographic_Content_on_the_Internet

  2. Krishnan RB, Yuvaraj D, Devi PS, Chooral VS, Kumar NR, Karthikeyan B, et al. An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital ImagesComputer Systems Science and Engineering . 2023;46(2):1563–1576. Available from: https://doi.org/10.32604/csse.2023.035307

  3. Zhang L, Wu J, Zhou N. Image Encryption with Discrete Fractional Cosine Transform and Chaos. In: 2009 Fifth International Conference on Information Assurance and Security. (pp. 61-64) IEEE. 2009.

  4. Ajit P, Chouhan K. A Study and literature Review on Image SteganographyInternational Journal of Computer Science and Information Technologies (IJCSIT). 2015;6(1):685–688. Available from: https://www.ijcsit.com/docs/Volume%206/vol6issue01/ijcsit20150601152.pdf

  5. Kutade PB, Bhalotra PSA. A Survey on Various Approaches of Image SteganographyInternational Journal of Computer Applications. 2015;109(3):1–5. Available from: https://dx.doi.org/10.5120/19165-0620

  6. Ali HA, Jalil AJ, Hussein MK. Least significant bit technology for hiding text data using video steganographyTELKOMNIKA (Telecommunication Computing Electronics and Control). 2023;22(1):157–163. Available from: https://dx.doi.org/10.12928/telkomnika.v22i1.24029

  7. Akshitha S, Desai SA, Aishwarya MS, Sahana SU, Sridhar R. The Image Steganography Using LSB And PVD AlgorithmsInternational Journal of Research and Analytical Reviews. 2023;10(2):237–249. Available from: https://www.ijrar.org/papers/IJRAR23B2960.pdf

  8. Potdar VM, Chang E. Grey level modification steganography for secret communication. In: 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004. (pp. 223-228) IEEE. 2005.

  9. Provos N, Honeyman P. Hide and seek: an introduction to steganographyIEEE Security & Privacy. 2003;1(3):32–44. Available from: https://dx.doi.org/10.1109/msecp.2003.1203220

  10. Amarendra K, Mandhala VN, Gupta BC, Sudheshna GG, Anusha VV, . Image Steganography Using LSBInternational Journal of Scientific and Technology Research. 2019;8(12):906–909. Available from: https://www.ijstr.org/final-print/dec2019/-Image-Steganography-Using-Lsb.pdf

Cite this article

Shejwal P, Salla R, Sanap S, Baride A, Patil P. (2025). LSB Steganography: A Key to Effectual Encryption and Decryption. International Journal of Electronics and Computer Applications. 2(1):83-89. https://doi.org/10.70968/ijeaca.v2i1.D1003

Views
62
Downloads
18
Citations