In this paper, a computer program based on the least significant bit steganography method was developed. In the program, the message image (the original barcode) was inserted into cover image (false barcode) to produce the stego image barcode by this method. These two images were compared and validated by counting the Mean Square Error, the Root Means Square Error and the Peak Signal to Noise Ratio. The result shown that the program was proper because the Mean Square Error was 0.192314, Root Means Square Error was 0.438537 and the Peak Signal to Noise Ratio were 55.3247 dB. we can conclude that the 1 least significant bit gave the best stego image.

1.
N.
Hamid
,
A.
Yahya
,
R. B.
Ahmad
and
O. M.
Al-Qershi
,
Image Steganography Techniques: An Overview
,
IJCSS
6
, pp.
168
187
(
2012
).
2.
A.
Kumar
and
A. K.
Nigam
,
Implementation of 2D Optimal Barcode (QR Code) for Images
,
International Journal of Computer Applications Technology and Research
4
, pp.
179
183
(
2015
).
3.
X.
Feng
and
H.
Zheng
,
Design and Realization of 2D Color Barcode with High Compression Ratio
,
International Conference on Computer Design and Applications
1
, pp.
314
317
(
2010
).
4.
N.
Victor
,
Enhancing the Data Capacity of QR Codes by Compressing the Data before Generation
,
International Journal of Computer Applications
60
, pp.
17
21
(
2012
).
5.
R.
Rani
and
G.
Deep
,
Digital 3D Barcode Image as a Container for Data Hiding Using Steganography
,
ISPCC
, pp.
325
330
(
2017
)
6.
Y.
van der Westhuizen
and
D.
Chai
,
3D dynamic barcode
,
Electronics Letters
54
, pp.
1024
1026
(
2018
).
7.
A.
Grover
 et al, “Parameters Effecting 2D Barcode Scanning Reliability” in
Advances in Computers
vol
80
, (
Burlington
:
Academic Press
,
2010
), pp.
209
235
.
8.
T.
Morkel
,
J.H.P.
Eloff
and
M.S.
Olivier
,
An Overview of Image Steganography
,
Proceedings of the Fifth Annual Information Security South Africa Conference.
(
2005
)
9.
P.
Xuea
,
H
Liu
,
J
Hu
and
R.
Hu
,
A Multi-Layer Steganographic method Based on Audio Time Domain Segmented and Network Steganography
,
AIP Conference Proceedings
1967
, pp.
020046-1
020046-17
(
2018
).
10.
M.
Devi
and
N.
Sharma
,
Improved Detection of Least Significant Bit Steganography Algorithms in Color and Gray Scale Images
,
Proceedings of 2014 RAECS UIET Panjab University Chandigarh
(
2014
)
11.
N.
Hamid
,
A.
Yahya
,
R. B.
Ahmad
and
O. M.
Al-Qershi
,
Image Steganography Techniques: An Overview
,
IJCSS
6
, pp.
168
187
(
2012
).
12.
S.
Goel
,
S.
Gupta
, and
N.
Kaushik
,
Image Steganography – Least Significant Bit with Multiple Progressions
,
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
328
, pp.
105
112
(
2015
).
13.
C.
Maiti
,
D.
Baksi
,
I.
Zamider
,
P.
Gorai
, and
D. R.
Kisku
,
Data Hiding in Images Using Some Efficient Steganography Techniques
,
CCIS
260
, pp.
195
203
(
2011
).
14.
F. Y.
Shih
(
2017
),
Digital Watermarking and Steganography
,
Boca Raton
:
CRC Press
.
15.
P.
Filzasavitra
,
T. W.
Purboyo
and
R. E.
Saputra
,
Analysis of Steganography on PNG hnage using Least Significant Bit (LSB), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE
),
Journal of Engineering and Applied Sciences
14
, pp.
7821
7827
(
2019
).
This content is only available via PDF.