{"id":428,"date":"2018-12-03T04:37:20","date_gmt":"2018-12-03T04:37:20","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?p=428"},"modified":"2019-08-13T10:43:11","modified_gmt":"2019-08-13T10:43:11","slug":"a-survey-on-digital-image-steganography-using-rgb-color-channel","status":"publish","type":"post","link":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/","title":{"rendered":"A Survey on Digital Image Steganography using RGB Color Channel"},"content":{"rendered":"<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><strong>\u00a0<\/strong><strong>pp<\/strong><strong>.21-25.<\/strong><\/span><\/p>\n<h1 style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Mamta Jain*, Pallavi Kumari<\/span><\/h1>\n<h1 style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><strong>*Corresponding \u00a0Author<\/strong><\/span><\/h1>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><em>M<\/em><em>od<\/em><em>y University Lakshmangarh, Rajasthan, India<\/em><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><em>Ema<\/em><em>il- <\/em><a href=\"mailto:mamta11.jain@gmail.com\"><em>mam<\/em><em>ta11.jain@gmail.com <\/em><\/a><em>, <\/em><a href=\"mailto:pallavikumari084@gmail.com\"><em>pa<\/em><em>llavikumari084@gmail.com<\/em><\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><strong>ABSTRACT<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Steganography help in communication of secured data in several carriers like audio, video, image, and text. But the most popular is image steganography which mostly using LSB technique to hide the data but the probability of detecting the hidden data is high .RGB is color model, which uses LSB to hide the data in three color channel. RGB images where each pixel is represented by three bytes indicate the intensity of red, green, and blue in that pixel. Maximum intensity color channel is used to indicate, which minimum intensity color channels have how many bits of data are hidden into it. Cryptography is also used for providing the security level along with the steganography. This article presents a survey on various RGB color model data hiding techniques.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><strong><em>Keywo<\/em><\/strong><strong><em>rds<\/em><\/strong><em>: RGB color model, Steganography, Data hiding.<\/em><\/span><\/p>\n<h2><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">INTRODUCTION<\/span><\/h2>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">The steganography is the ability and technique of writing hidden messages in such a manner that no body, apart from\u00a0 the transmitter and the\u00a0 intended recipient knows about communication. The word steganography is originally derived from the Greek words Stegano, which means, \u201ccovered\u201d, and Graptos, which means \u201cwriting\u201d. Digital steganography has many applications in today\u2019s life. Image based steganography technique need an image to hide the data inside the image; this image is called a cover media. In RGB color model, one of the channel used as an indicator channel and remaining two channels are used to conceal data. The last two\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">bits of indicator tell whether the data bits are hidden in the other two channels. The image steganography can categorize into two categories, namely spatial domain\u00a0 and frequency domain.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 12pt\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-433\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Untitled.png\" alt=\"\" width=\"593\" height=\"394\" \/><\/span><\/p>\n<h2><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Figure 1: Classification of Steganography<\/span><\/h2>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Some of the technique, which is use in RGB color model, is as follows:<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\"><strong>L<\/strong><strong>eas<\/strong><strong>t Significant Bits <\/strong>(LSB): This technique is an example of spatial domain technique, in which each pixel of specific color channel or for all color channels is\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">probability of hidden data is high. The LSB usually does not increase the file size, but based on the size of the data that is to be obscure inside the carrier file, the carrier file can become noticeably distorted.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><strong>Steg<\/strong><strong>o Color Cycle (SCC): <\/strong>It is an enhancement technique of LSB. The color channel where the secret data will be concealed in is repeating regularly for every bit based on specific pattern for example, the first bit of the secret data is stored in LSB of red channel, the second bit in green channel, the third bit in blue channel and so on. This technique is more secure than LSB but still it suffers observing the repeating pattern that will expose the hidden data.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\"><strong>P<\/strong><strong>ixel Indicator: <\/strong>One of the best keyless steganography approaches is pixel indicator. It is an improvement over the SCC method. In this one color channel is used as indicator and other two are used as container of secret message. The main drawback is that one of the color channels cannot be used to store the actual message.<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\"><strong>I<\/strong><strong>m<\/strong><strong>ag<\/strong><strong>e Intensity: <\/strong>It suggests storing inconsistent number of bits in each channel of pixel based on the real color value of that pixe .<\/span><span style=\"font-family: 'times new roman', times, serif\">The performance of various steganography methods can be rated by the three parameters: Security, Capacity, and Robustness. Security in steganography means detection of the hidden message inside the cover image is not captured. Capacity: means the amount of information that cover image could carry. Robustness: The capability of stego image, withstand the change regarding image manipulation, compression. Peak Signal to Noise Ratio (PSNR) is used to measure quality of stego image. PSNR is a statistical method for the assessment of the digital image and video quality. PSNR can be easily defined through Mean Square Error (MSE) method. PSNR is measured in decibels (dB). PSNR values falling below 30 dB indicate a fairly low quality; a high quality stego-image should strive for at least 40 dB.<\/span><\/span><\/p>\n<h2><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">LITERATURE SURVEY ON IMAGE STEGANOGRAPHY TECHNIQUE USING RGB COLOR MODEL<\/span><\/h2>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">In image steganography, image is used to hide the information. Image is the most common cover objects in steganography. The digital color image is the collection of pixels which usually stored in 24 bit files and uses RGB color model with each primary color representing 8 bit each. Here we are reviewing some method according to LSB, Pixel Indicator, SCC, and Image Intensity technique using RGB color model or channel<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">S. Daggar[1] author proposed a method to hiding secret data in different position of RGB Image, which required element like cover image, secret message, two secret keyKey1 and Key2 (key1 is a circular ID array with only 0 or 1 value is allowed,key2 is a ID array with 8 digits).LSB of Red value of pixel is XOR with key1 bits then result is used for taking decision that secret information bit will be placed in\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">blue or green.key2 is use to describe the position where secret information will be placed. This process is carried out repeatedly until all secret information bits are placed.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Let we have<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Key1 = 0,0,1,0,1,0,0,1<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">Key2 =5,4,2,3,6,1,0, 1<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">B =1,0,0,1,1,0,1,1 (B is the secret Information ) Red\u00a0\u00a0 Green\u00a0\u00a0\u00a0\u00a0 Blue<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">10010110\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a010001110\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a000011110<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">10110011\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a010110011\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a010010111<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">Key2 described the position of secret information i.e. 1st bit of B \u20181\u2019 will be placed at 5th bit position, 2nd\u00a0bit of B \u20180\u2019 will be placed at 4thposition, 3rd bit of B \u20180\u2019 will be placed at 2th bit position,4th\u00a0 bit of B\u20191\u2019 will be placed at 3rd bit position,5th bit of B\u20191\u2019 will be placed at 6th bit position , 6th bit of B\u20190\u2019 will be placed at 1st bit position,7th bit of B \u20181\u2019will be placed at 0th bit position ,8th bit of B \u20181\u2019will be placed at 1st\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">bit position. Next process is how we hide the first two bits of secret information in two pixels of cover image. Take the LSB of red in pixel 1 i.e.\u20190\u2019 is XOR with 1st bit of key1 i.e.\u20190\u2019 and outcomes of this XOR operation is\u20190\u2019 this \u20180\u2018decides that 1st bit of secret\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">information will be placed at 5th bit of green. Now in\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">pixel 2, LSB of red is i.e. \u20181\u2019is XOR with 2nd bit of key1 i.e. is \u20180\u2019 outcomes of this operation is\u20191\u2019 this \u20181\u2019 decides that 2nd bit of secret information will be placed at 4th bit of blue. Same process continues until the \u00a0all \u00a0secrets \u00a0bits \u00a0are \u00a0placed \u00a0at \u00a0their \u00a0respective\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">position.<\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">This proposed approach concludes that this approach is very beneficial and secure against attacks, this is\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">effective way of hiding information without any visible distortion in the carrier image. This method provides higher PSNR values as higher PSNR value lower the distortion.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">In [2] author proposed a technique which is combination of both steganography and cryptography for better security of secret of information. In a RGB image each pixel (24 bits) is having R channel 8 bits, G channel 8 bits and B channel 8 bits. One of the channel is used as indicator channel and remaining two channel are used for hiding secret message .The indicator channel is chosen based on the sum of color values and embedding is, as 4 bit in each selected channel satisfying some condition. This proposed scheme is a novel approach. This technique is one of the efficient approaches. Capacity and PSNR is better as compared to some of the existing algorithm. No visual artifacts can be observed from the corresponding stego image.<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">In [3] author proposed a method performs variable length bits embedding in RGB colored channel of color image. Two type of channel is used here one is called indicator channel which indicates how many data bits are hidden in the data channel, the other is data channel which is used for embedding of data bits. The secret message is converted into two kind of plain text RSA plaintext and IDEA plain text.\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">Each alphanumeric letter of the secret message is converted into its ASCII equivalent which gives a unique integer number for the entire message which is called RSA plain text.\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">We are basically hiding both the cipher text obtained from RSA and the IDEA algorithm within the image. One cipher text is utilized to decide the position for the information concealing and the other cipher content covered up in the LSBs of the cover channel\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">of the selected pixels utilizing variable length LSB based information implanting.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">The enhanced security provided by this approach is due to the use of Cryptographic algorithm of RSA and IDEA. Thus it serves the purpose of secrecy, security and robustness of data. This technique ensures the authenticity checks for important documents and hence may find use in exchange of confidential information or\u00a0 establishing the authenticity of a particular documents etc.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">In [4] author proposed an efficient technique for hiding the data inside image by the use of X-BOX, which enhance the security level. A very well-known LSB approached produces very attractive results but its retrieval is very easy by applying retrieval method this makes attackers easy to detect the secret information. There is an X-BOX mapping, where various boxes are used, which contains sixteen numerous values (X represents any integer value from 0-9). For example i.e. X-BOX is a 2*2 matrix, There will be four boxes used in which 16 values are stored from 0 to 15.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">To insert the values in the X-BOXES, XOR property is applied. Hence, the stego image is formed with the changes of pixels of Red, Green, and Blue color. This resultant changed pixels values form the stego image. This approach produces better results because of the use of X-BOX enhances the level of security such that any unauthorized user to not able to identify the changes in the in stego image.<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">In [5] author proposed an method to hide an secret message which is in the form of image, based on LSB insertion technique into cover image. Both the secret image and cover image are 24 bit RGB color image. The concept of mapping is applied on RGB image for making it more secure, each channel of RGB image\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">use two different key boxes for mapping for example R-box1,R-box2 for R-channel;G-box1,G-box2 for G-channel ;B-box1,B-box2 for B channel .Each of these two boxes for a channel have 4 different values which are used to map the pixel value of that channel of secret image to 3LSB bits of corresponding channel of cover image. The concept of mapping and use of key box as stego key enhance the security level.<\/span><\/span><\/p>\n<h2><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">CONCLUSION<\/span><\/h2>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">In this paper many expert has discussed different methods and technique, which is used in RGB based image steganography. In the RGB color model, LSB technique, substitution can be done up to 4 least significant bits. The RGB color image can be embedded with the direct LSB substitution. The RGB color model LSB technique gives high capacity, but gives moderate security as compared to technique of other color model of digital image steganography.<\/span><\/p>\n<h2><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">REFERENCES<\/span><\/h2>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[1] S. Dagar, 2013. \u201cRGB Based Dual Key Image Steganography\u201d, IEEE Conference, The Next Generation Information Technology Summit (4thInternational \u00a0Conference), \u00a0pp.316-320.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[2] G. Swain and S .K. Lenka, 2012. \u201cA Better RGB Based Image Steganography Technique\u201d. Springer-Verlag Berlin Heidelberg, Part II, CCIS 270, pp.470-478.<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">[3]K. UPreti, K Verma, and A. Sahoo, 2010 \u201cVariable Bits Secure System For Color Image\u201d\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">,IEEE Computer Society, Second International Conferences On Advances In Computing, Control And Telecommunication Technologies,pp.105- 107.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[4] E. Dagar and S. Dagar, 2014. \u201cLSB Based Image Steganography Using X-Box Mapping\u201d, IEEE International conference on Advances in Computing Communication and Informatics, pp. 351-355.<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">[5]T. Bedwal, M. Kumar, 2014. \u201cAn Enhanced And Secure Image Steganographic Technique Using RGB \u2013BOX Mapping\u201d, 4th international conference\u00a0 \u00a0the\u00a0 \u00a0next\u00a0 \u00a0generation\u00a0 \u00a0information\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">technology summit, IEEE.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[6]A. K. Bairagi, S. Mondal and R. Debnath, 2014. \u201cA\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Robust RGB Channel Based Image Steganography Technique using a Secret Key,\u201d IEEE 16th Int&#8217;l Conf. Computer and Information Technology, pp. 81-87.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[7]D. Neeta, K. Snehal and D. Jacobs, 2006. \u201cImplementation of LSB Steganography and Its Evaluation for Various Bits,\u201d 1st International Conference on Digital Information Management, pp. 173-178.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[8] M. Jain, and S.K. Lenka, 2015. \u201cDigital Image Steganography using RGB Color Model: A Review\u201d International Journal of Applied Engineering Research ISSN 0973-4562 Vol.10, No.24, pp 44468-44474.<\/span><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-family: 'times new roman', times, serif\">[9] M. Jain. and S.K. Lenka, 2016. \u201cA Review of Digital Image Steganography using LSB and LSB Array\u201d, International Journal of Applied Engineering Research ISSN: 0973-4562 Vol. 11,\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">No.3. pp 1820-1824.<\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[10] M. Jain, and S.K. Lenka, 2016. \u201cDiagonal queue medical image steganography with Rabin cryptosystem\u201d, Brain Informatics, Springer, Vol. 3, No.1, pp. 39-51.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;font-size: 12pt\">[11] M. Jain, and S.K. Lenka, 2016. \u201cAdaptive circular queue image steganography with RSA cryptosystem\u201d, Perspective in Science, Elsevier, Vol. 8, pp. 417-420.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0pp.21-25. Mamta Jain*, Pallavi Kumari *Corresponding \u00a0Author Mody University Lakshmangarh, Rajasthan, India Email- mamta11.jain@gmail.com , pallavikumari084@gmail.com &nbsp; ABSTRACT Steganography help in communication of secured data in several carriers like audio, video, image, and text. But the most popular is image steganography which mostly using LSB technique to hide the data but the probability of detecting [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,43],"tags":[],"class_list":["post-428","post","type-post","status-publish","format-standard","hentry","category-journal-of-environment-science-and-technology","category-volume-3-issue-1-2017-journal-of-environment-science-and-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Survey on Digital Image Steganography using RGB Color Channel - research journal\" \/>\n<meta property=\"og:description\" content=\"\u00a0pp.21-25. Mamta Jain*, Pallavi Kumari *Corresponding \u00a0Author Mody University Lakshmangarh, Rajasthan, India Email- mamta11.jain@gmail.com , pallavikumari084@gmail.com &nbsp; ABSTRACT Steganography help in communication of secured data in several carriers like audio, video, image, and text. But the most popular is image steganography which mostly using LSB technique to hide the data but the probability of detecting [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-03T04:37:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-13T10:43:11+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Untitled.png\" \/>\n<meta name=\"author\" content=\"gyanvihar2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gyanvihar2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/\",\"name\":\"A Survey on Digital Image Steganography using RGB Color Channel - research journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Untitled.png\",\"datePublished\":\"2018-12-03T04:37:20+00:00\",\"dateModified\":\"2019-08-13T10:43:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/14d146521108f7ec79f6ca244a14cc77\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#primaryimage\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Untitled.png\",\"contentUrl\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Untitled.png\",\"width\":593,\"height\":394},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Survey on Digital Image Steganography using RGB Color Channel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/14d146521108f7ec79f6ca244a14cc77\",\"name\":\"gyanvihar2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cce47db716b101ef36fc3253de08315e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cce47db716b101ef36fc3253de08315e?s=96&d=mm&r=g\",\"caption\":\"gyanvihar2\"},\"url\":\"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/","og_locale":"en_US","og_type":"article","og_title":"A Survey on Digital Image Steganography using RGB Color Channel - research journal","og_description":"\u00a0pp.21-25. Mamta Jain*, Pallavi Kumari *Corresponding \u00a0Author Mody University Lakshmangarh, Rajasthan, India Email- mamta11.jain@gmail.com , pallavikumari084@gmail.com &nbsp; ABSTRACT Steganography help in communication of secured data in several carriers like audio, video, image, and text. But the most popular is image steganography which mostly using LSB technique to hide the data but the probability of detecting [&hellip;]","og_url":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/","og_site_name":"research journal","article_published_time":"2018-12-03T04:37:20+00:00","article_modified_time":"2019-08-13T10:43:11+00:00","og_image":[{"url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Untitled.png","type":"","width":"","height":""}],"author":"gyanvihar2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"gyanvihar2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/","url":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/","name":"A Survey on Digital Image Steganography using RGB Color Channel - research journal","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#primaryimage"},"thumbnailUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Untitled.png","datePublished":"2018-12-03T04:37:20+00:00","dateModified":"2019-08-13T10:43:11+00:00","author":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/14d146521108f7ec79f6ca244a14cc77"},"breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#primaryimage","url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Untitled.png","contentUrl":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Untitled.png","width":593,"height":394},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/a-survey-on-digital-image-steganography-using-rgb-color-channel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"A Survey on Digital Image Steganography using RGB Color Channel"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/14d146521108f7ec79f6ca244a14cc77","name":"gyanvihar2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cce47db716b101ef36fc3253de08315e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cce47db716b101ef36fc3253de08315e?s=96&d=mm&r=g","caption":"gyanvihar2"},"url":"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=428"}],"version-history":[{"count":2,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/428\/revisions"}],"predecessor-version":[{"id":2216,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/428\/revisions\/2216"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/categories?post=428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/tags?post=428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}