Downloads provided by UsageCounts
{"references": ["Jassim, Firas A., \"A novel steganography algorithm for hiding text in image using five modulus method\", arXiv preprint arXiv, Vol. 72, No. 17, PP. 39-44, 2013.", "Bandyopadhyay, Debiprasad, et al., \"A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain\", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 3, No. 1, PP. 11-22, 2014.", "Jain, Nitin, Sachin Meshram, and Shikha Dubey., \"Image Steganography Using LSB and Edge\u2013Detection Technique\", International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, No. 3, PP. 217-222, 2012.", "Rakhi1 & Vijay Prakash Singh., \" Data Hiding In Skin Tone Of Images Using SteganographY\", International Journal of Electronics and Communication Engineering (IJECE), Vol. 2, No. 4, PP. 105-112, 2014.", "Goel, Stuti, Arun Rana, and Manpreet Kaur., \"Comparison of image steganography techniques\", International Journal of Computers and Distributed Systems, Vol. 3, No. 1, PP. 20-30, 2013.", "Lwin, Thandar, and SUWAI PHYO., \"Information Hiding System Using Text and Image Steganography\", International Journal of Scientific Engineering and Technology Research, Vol. 3, No. 4, PP. 1972-1977, 2014.", "Krati Vyas, B.L.Pal, \"A Proposed Method In Image Steganography To Improve Image Quality With Lsb Technique\", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 1, PP. 5246-5251, 2014.", "Rawat, Deepesh, and Vijaya Bhandari., \"Steganography Technique for Hiding Text Information in Color Image using Improved LSB Method\", International Journal of Computer Applications, Vol. 67, No. 1, PP. 22-25, 2013."]}
This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.
crop., LSB, Steganography, stego
crop., LSB, Steganography, stego
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 11 | |
| downloads | 4 |

Views provided by UsageCounts
Downloads provided by UsageCounts