Image Steganography Using Web Application

Image Steganography Using Web Application


  • Nor Arzami Othman Universiti Teknologi MARA, Perlis Branch
  • Mohd Nizam Osman Universiti Teknologi MARA, Perlis Branch
  • Khairul Anwar Sedek Universiti Teknologi MARA, Perlis Branch
  • Muhammad Nur Harith Shariffudin Universiti Teknologi MARA, Perlis Branch



Steganographic, Randomized Least Significant Bit, Web application, Hiding information


Nowadays most people are workaholics, driven by intense peer pressure to break new ground. Therefore, rather than using books as their source material, photographic memories are kept as images. However, to protect sensitive information, reliable and secure communication techniques are necessary in many real-world situations. This research offers a user-friendly interface for securely embedding and extracting secret information within digital images. The primary goals are to design a steganographic algorithm for concealing data in images and to evaluate the usability of image steganography while keeping the quality of images and the access to decode the image. The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. Users can upload their desired image, select the preferred steganographic algorithm, and encode the hidden data for added security. The web application supports encoding and decoding images for concealing data in images. To evaluate its performance, extensive testing was conducted, including embedding and extracting data using different image formats. The results demonstrated the application's effectiveness in hiding information while preserving image quality. The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. In conclusion, the Image Steganography Web Application provides a convenient and secure solution for individuals and organizations needing to transmit sensitive data covertly within images, ensuring data privacy and integrity in an intuitive and user-friendly manner.


Download data is not yet available.


Agarwal, A., & Malik, S. (2022). A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis. 2022 IEEE 7th International Conference for Convergence in Technology, I2CT 2022.

Al-Fedaghi, S. (2011). Developing Web Applications. International Journal of Software Engineering and Its Applications, 5(2), 57–68.

Alshamrani, A., & Bahattab, A. (2015). A Comparison Between Three SDLC Models Waterfall Model, Spiral Model, and Incremental/Iterative Model. IJCSI International Journal of Computer Science Issues, 12(1), 106–111.

Baldha, N. (2022). Web-based Image Steganography [University of Regina].

Bowne, S. (2018). Hands-On Cryptography with Python. Packt Publishing.

Goel, A. (2020, August 20). Image based Steganography using Python. Geeksforgeeks.

Grinberg, M. (2018). Flask Web Development: Developing Web Applications With Python (2nd ed.). O’Reilly Media.

Li, X., & Li, H. (2018). A Visual Analysis of Research on Information Security Risk by Using CiteSpace. IEEE Access, 6, 63243–63257.

Rama Vyshnavi, V., & Malik, A. (2019). Efficient Way of Web Development Using Python and Flask. International Journal of Recent Research Aspects, 6(2), 16–19.

Rout, H., & Mishra, B. K. (2014). Pros and Cons of Cryptography, Steganography and Perturbation techniques. IOSR Journal of Electronics and Communication Engineering, 2278–8735.




How to Cite

Nor Arzami Othman, Mohd Nizam Osman, Khairul Anwar Sedek, & Muhammad Nur Harith Shariffudin. (2023). Image Steganography Using Web Application. Journal of Computing Research and Innovation, 8(2), 1–11.



General Computing