Implementation of Steganographic Model using Inverted LSB Insertion

  • Shubhangi D. Kamat
  • Prof. S.S. Patil
  • Prof. A.S. Mali
Keywords: Steganography, Least Significant Bit, Peak Signal to Noise Ratio, Cover Image, Steganalysis


The most important thing in this insecure world is the secrecy of everything. In today’s world, any important data costs more than money. Steganography is the technique in which one can hide data as a secrete in selected image.  In case of spatial domain, LSB approach is most popular in steganography, where all the LSBs of pixels of image are replaced by the bits of secret data.  But the problem is that the secrete can be easily guessed by the hacker and the data is obtained by extracting it from direct LSBs. To make the system more robust and to improve the signal to noise ratio, the conventional LSB insertion method is replaced by inverted  LSB technic. The decision to invert or not the LSB depends on combination of the 2nd and 3rd LSB. As not each and every LSB is inverted, it makes the steganalysis very difficult.


Download data is not yet available.


Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, & Partha Pratim Sarkar. (2012). An image steganography technique using x-box mapping. IEEE- International Conference on Advances in Engineering, Science and Management (ICAESM), 709-713.

Nadeem Akhtar, Shahbaaz Khan, & Pragati Johri. (2014). An improved inverted LSB image steganography. International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 749-755.

Mandar D. Khatavkar & Prof. A.S. Mali. (2016). A Image security with image steganography using DCT coefficient and encryption. International Journal of Innovations in Engineering Research and Technology, 3(9), 1-8.

Hemang A. Prajapati & Dr. Nehal G. Chitaliya. (2015). Secured and robust dual image steganography:A survey. International Journal of Innovative Research in Computer and Communication Engineering, 3(1), 30-37.

Zhenhao Zhu, Tao Zhang, & Baoji Wan. (2013). A special detector for the edge adaptive image steganography based on LSB matching revisited. 10th IEEE International Conference on Control and Automation (ICCA) Hangzhou, China, 1363-1366.

Jatinder Kaur & Ira Gabba. (2013 August). Steganography using RSA algorithm. International Journal of Innovative Technology and Exploring Engineering, 3(3), 75-79.

Miss Sonali V.Nemade & Prof. A.S. Mali. (2016). A review of automatic detection of micro aneurysm and diabetic retinopathy grading in fundus retinal images. International Journal of Research Publication in Engineering and Technology, 2(4), 1-3.

Weiqi Luo, Fangjun Huang, & Jiwu Huang. (2010 June). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201-214.

Swati Tiwari & R.P.Mahajan. (2012). A secure image based steganographic model using RSA algorithm and LSB insertion for increased robustness. International Journal of Electronics Communication and Computer Engineering, 3(1), 7-85.

Manjunath N & S.G. Hiremath. (2015). Image and text steganography based on RSA and chaos cryptography algorithm with hash LSB technique for more security. International Journal of Electrical, Electronics and Computer Systems, 3(5), 5-9.

Dr. M.Umamaheswari, Prof. S.Sivasubramanian, & S.Pandiarajan. (2010 August). Analysis of different steganographic algorithms for secured data hiding. International Journal of Computer Science and Network Security, 10(8), 154-160.

R.Chandramouli & Nasir Memon. (2001). Analysis of LSB based image steganography techniques. IEEE International Conference on Image Processing (ICIP) - Thessaloniki, Greece, 1019-1022.

How to Cite
Shubhangi D. Kamat, Prof. S.S. Patil, & Prof. A.S. Mali. (2018). Implementation of Steganographic Model using Inverted LSB Insertion. International Journal of Engineering and Management Research, 8(4), 59-62.