In this paper, a computer program based on the least significant bit steganography method was developed. In the program, the message image (the original barcode) was inserted into cover image (false barcode) to produce the stego image barcode by this method. These two images were compared and validated by counting the Mean Square Error, the Root Means Square Error and the Peak Signal to Noise Ratio. The result shown that the program was proper because the Mean Square Error was 0.192314, Root Means Square Error was 0.438537 and the Peak Signal to Noise Ratio were 55.3247 dB. we can conclude that the 1 least significant bit gave the best stego image.
REFERENCES
1.
N.
Hamid
, A.
Yahya
, R. B.
Ahmad
and O. M.
Al-Qershi
, Image Steganography Techniques: An Overview
, IJCSS
6
, pp. 168
–187
(2012
).2.
A.
Kumar
and A. K.
Nigam
, Implementation of 2D Optimal Barcode (QR Code) for Images
, International Journal of Computer Applications Technology and Research
4
, pp. 179
–183
(2015
).3.
X.
Feng
and H.
Zheng
, Design and Realization of 2D Color Barcode with High Compression Ratio
, International Conference on Computer Design and Applications
1
, pp. 314
–317
(2010
).4.
N.
Victor
, Enhancing the Data Capacity of QR Codes by Compressing the Data before Generation
, International Journal of Computer Applications
60
, pp. 17
–21
(2012
).5.
R.
Rani
and G.
Deep
, Digital 3D Barcode Image as a Container for Data Hiding Using Steganography
, ISPCC
, pp. 325
–330
(2017
)6.
Y.
van der Westhuizen
and D.
Chai
, 3D dynamic barcode
, Electronics Letters
54
, pp. 1024
–1026
(2018
).7.
A.
Grover
et al, “Parameters Effecting 2D Barcode Scanning Reliability” in Advances in Computers
vol 80
, (Burlington
: Academic Press
, 2010
), pp. 209
–235
.8.
T.
Morkel
, J.H.P.
Eloff
and M.S.
Olivier
, An Overview of Image Steganography
, Proceedings of the Fifth Annual Information Security South Africa Conference.
(2005
)9.
P.
Xuea
, H
Liu
, J
Hu
and R.
Hu
, A Multi-Layer Steganographic method Based on Audio Time Domain Segmented and Network Steganography
, AIP Conference Proceedings
1967
, pp. 020046-1
–020046-17
(2018
).10.
M.
Devi
and N.
Sharma
, Improved Detection of Least Significant Bit Steganography Algorithms in Color and Gray Scale Images
, Proceedings of 2014 RAECS UIET Panjab University Chandigarh
(2014
)11.
N.
Hamid
, A.
Yahya
, R. B.
Ahmad
and O. M.
Al-Qershi
, Image Steganography Techniques: An Overview
, IJCSS
6
, pp. 168
–187
(2012
).12.
S.
Goel
, S.
Gupta
, and N.
Kaushik
, Image Steganography – Least Significant Bit with Multiple Progressions
, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
328
, pp. 105
–112
(2015
).13.
C.
Maiti
, D.
Baksi
, I.
Zamider
, P.
Gorai
, and D. R.
Kisku
, Data Hiding in Images Using Some Efficient Steganography Techniques
, CCIS
260
, pp. 195
–203
(2011
).14.
F. Y.
Shih
(2017
), Digital Watermarking and Steganography
, Boca Raton
: CRC Press
.15.
P.
Filzasavitra
, T. W.
Purboyo
and R. E.
Saputra
, Analysis of Steganography on PNG hnage using Least Significant Bit (LSB), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE
), Journal of Engineering and Applied Sciences
14
, pp. 7821
–7827
(2019
).
This content is only available via PDF.
© 2019 Author(s).
2019
Author(s)