Image Steganography Using Web Application

Image Steganography Using Web Application

Authors

  • Nor Arzami Othman Universiti Teknologi MARA, Perlis Branch
  • Mohd Nizam Osman Universiti Teknologi MARA, Perlis Branch
  • Khairul Anwar Sedek Universiti Teknologi MARA, Perlis Branch
  • Muhammad Nur Harith Shariffudin Universiti Teknologi MARA, Perlis Branch

DOI:

https://doi.org/10.24191/jcrinn.v8i2.373

Keywords:

Steganographic, Randomized Least Significant Bit, Web application, Hiding information

Abstract

Nowadays most people are workaholics, driven by intense peer pressure to break new ground. Therefore, rather than using books as their source material, photographic memories are kept as images. However, to protect sensitive information, reliable and secure communication techniques are necessary in many real-world situations. This research offers a user-friendly interface for securely embedding and extracting secret information within digital images. The primary goals are to design a steganographic algorithm for concealing data in images and to evaluate the usability of image steganography while keeping the quality of images and the access to decode the image. The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. Users can upload their desired image, select the preferred steganographic algorithm, and encode the hidden data for added security. The web application supports encoding and decoding images for concealing data in images. To evaluate its performance, extensive testing was conducted, including embedding and extracting data using different image formats. The results demonstrated the application's effectiveness in hiding information while preserving image quality. The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. In conclusion, the Image Steganography Web Application provides a convenient and secure solution for individuals and organizations needing to transmit sensitive data covertly within images, ensuring data privacy and integrity in an intuitive and user-friendly manner.

Downloads

Download data is not yet available.

References

Agarwal, A., & Malik, S. (2022). A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis. 2022 IEEE 7th International Conference for Convergence in Technology, I2CT 2022. https://doi.org/10.1109/I2CT54291.2022.9825422

Al-Fedaghi, S. (2011). Developing Web Applications. International Journal of Software Engineering and Its Applications, 5(2), 57–68.

Alshamrani, A., & Bahattab, A. (2015). A Comparison Between Three SDLC Models Waterfall Model, Spiral Model, and Incremental/Iterative Model. IJCSI International Journal of Computer Science Issues, 12(1), 106–111. www.IJCSI.org

Baldha, N. (2022). Web-based Image Steganography [University of Regina]. https://www.researchgate.net/publication/357810624

Bowne, S. (2018). Hands-On Cryptography with Python. Packt Publishing.

Goel, A. (2020, August 20). Image based Steganography using Python. Geeksforgeeks. https://www.geeksforgeeks.org/image-based-steganography-using-python/

Grinberg, M. (2018). Flask Web Development: Developing Web Applications With Python (2nd ed.). O’Reilly Media.

Li, X., & Li, H. (2018). A Visual Analysis of Research on Information Security Risk by Using CiteSpace. IEEE Access, 6, 63243–63257. https://doi.org/10.1109/ACCESS.2018.2873696

Rama Vyshnavi, V., & Malik, A. (2019). Efficient Way of Web Development Using Python and Flask. International Journal of Recent Research Aspects, 6(2), 16–19.

Rout, H., & Mishra, B. K. (2014). Pros and Cons of Cryptography, Steganography and Perturbation techniques. IOSR Journal of Electronics and Communication Engineering, 2278–8735. www.iosrjournals.org

Downloads

Published

2023-09-01

How to Cite

Nor Arzami Othman, Mohd Nizam Osman, Khairul Anwar Sedek, & Muhammad Nur Harith Shariffudin. (2023). Image Steganography Using Web Application. Journal of Computing Research and Innovation, 8(2), 1–11. https://doi.org/10.24191/jcrinn.v8i2.373

Issue

Section

General Computing
Loading...