Volume: 2 Issue: 1
Year: 2025, Page: 83-89, Doi: https://doi.org/10.70968/ijeaca.v2i1.D1003
Received: Feb. 2, 2025 Accepted: June 25, 2025 Published: July 12, 2025
Steganography is an ancient process used in secrecy and has found new relevance in the modern digital era. In our day-to-day life, we rely on digital media for our personal and professional online communication, the need to protect sensitive information gains paramount importance 1. The threats to hacking of sensitive data in the form of text, image and audio which may lead to heavy financial losses call for innovative and sophisticated methods to ensure encrypted end to end communication, protecting information from unauthorized access. In this regard, the challenge lies in encrypting and decrypting data securely when sending over communication media. Conventional encryption methods may not be full proof to handle new ways of data hacking techniques. Steganography has emerged as a suitable solution which enables the concealment of information which is in the form of image, text, audio and video. Conventional techniques may not fully address the challenges in a wide range of digital communication, necessitating the development of advanced methodologies. A lot of research work has been done in the domain of Security. The LSB Steganography technique has relevant features that collectively enhance its scope and applicability in a wide range of communication. This paper presents enhanced LSB steganography technique to encrypt and decrypt text, image and audio files successfully.
Keywords: LSB Steganography: A Key to Effectual Encryption and Decryption
Provos N, Honeyman P. Detecting Steganographic Content on the Internet. 2002. Available from: https://www.researchgate.net/publication/2379632_Detecting_Steganographic_Content_on_the_Internet
Krishnan RB, Yuvaraj D, Devi PS, Chooral VS, Kumar NR, Karthikeyan B, et al. An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images. Computer Systems Science and Engineering . 2023;46(2):1563–1576. Available from: https://doi.org/10.32604/csse.2023.035307
Zhang L, Wu J, Zhou N. Image Encryption with Discrete Fractional Cosine Transform and Chaos. In: 2009 Fifth International Conference on Information Assurance and Security. (pp. 61-64) IEEE. 2009.
Ajit P, Chouhan K. A Study and literature Review on Image Steganography. International Journal of Computer Science and Information Technologies (IJCSIT). 2015;6(1):685–688. Available from: https://www.ijcsit.com/docs/Volume%206/vol6issue01/ijcsit20150601152.pdf
Kutade PB, Bhalotra PSA. A Survey on Various Approaches of Image Steganography. International Journal of Computer Applications. 2015;109(3):1–5. Available from: https://dx.doi.org/10.5120/19165-0620
Ali HA, Jalil AJ, Hussein MK. Least significant bit technology for hiding text data using video steganography. TELKOMNIKA (Telecommunication Computing Electronics and Control). 2023;22(1):157–163. Available from: https://dx.doi.org/10.12928/telkomnika.v22i1.24029
Akshitha S, Desai SA, Aishwarya MS, Sahana SU, Sridhar R. The Image Steganography Using LSB And PVD Algorithms. International Journal of Research and Analytical Reviews. 2023;10(2):237–249. Available from: https://www.ijrar.org/papers/IJRAR23B2960.pdf
Potdar VM, Chang E. Grey level modification steganography for secret communication. In: 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004. (pp. 223-228) IEEE. 2005.
Provos N, Honeyman P. Hide and seek: an introduction to steganography. IEEE Security & Privacy. 2003;1(3):32–44. Available from: https://dx.doi.org/10.1109/msecp.2003.1203220
Amarendra K, Mandhala VN, Gupta BC, Sudheshna GG, Anusha VV, . Image Steganography Using LSB. International Journal of Scientific and Technology Research. 2019;8(12):906–909. Available from: https://www.ijstr.org/final-print/dec2019/-Image-Steganography-Using-Lsb.pdf
© 2025 Shejwal et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Shejwal P, Salla R, Sanap S, Baride A, Patil P. (2025). LSB Steganography: A Key to Effectual Encryption and Decryption. International Journal of Electronics and Computer Applications. 2(1):83-89. https://doi.org/10.70968/ijeaca.v2i1.D1003