A Novel Framework for Information Hiding and Image Encryption using Least Significant Bit Techniques


  • H. B. Kekre NMIMS University
  • Tanuja Sarode Mumbai University
  • Pallavi Halarnkar NMIMS University




Image security, Information Hiding, Steganography, Image Encryption, Image Scrambling.


Security of Digital Images is utmost important. Nowadays not only data but also digital images are increasing in a huge number. Good encryption techniques are always in need. In this paper we have proposed a Novel Framework, which is a combination of Information Hiding and Image Scrambling. The proposed framework is one of its kind and doesn’t resemble to any existing frameworks in literature. For Image scrambling R-Prime Shuffle technique has been  used.


. Mielikainen, Jarno. LSB matching revisited. Signal Processing Letters, IEEE 13, no. 5 (2006) .p. 285-287.

. Battisti, F., M. Carli, A. Neri, and K. Egiaziarian. A Generalized Fibonacci LSB Data Hiding Technique. Computers and Devices for Communication (CODEC-06), Institute of Radio Physics and Electronics, University of Calcutta International Conference on. 2006.

. Dey, Sandipan, Ajith Abraham, and Sugata Sanyal. An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on,. IEEE, 2007. p. 101-108

. Kekre, H. B., and Archana A. Athawale. Personal Data Ingrain and Regain., NCA, FCRCE, Bandra (W), Mumbai, 16th-17th May (2008).National Conference on Algorithms p. 88-93

. Kekre, H. B., Archana A. Athawale, and Sudeep D. Thepade. Clandestine Data Entrenching and Salvaging. In National Conference on Information and Communication Technology 29th Feb and 1st Mar, NCICT-08.p. 1-7

. Biswas, Rajib, Sayantan Mukherjee, and Samir Kumar Bandyopadhyay. DCT Domain Encryption in LSB Steganography. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on,. IEEE, 2013. p. 405-408

. Zhang, Hai-Yan. A new image scrambling algorithm based on queue transformation. In Machine Learning and Cybernetics, 2007 International Conference on, vol. 3, IEEE, 2007. p. 1526-1530.

. Li, Min, Ting Liang, and Yu-jie He. Arnold Transform Based Image Scrambling Method. Multimedia Tecnhnology (ICMT 2013) International Conference on .2013. p.1309-1316

. Kekre, H. B., Tanuja Sarode, and Pallavi Halarnkar. Image Scrambling using R-Prime Shuffle. IJAREEIE, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.2013. 2(8). p.4070-4076

. Kekre, H. B., Tanuja Sarode, and Pallavi Halarnkar. Image Scrambling using R-Prime Shuffle on Image and Image Blocks. IJARCCE. International Journal of Advanced Research in Computer and Communication Engineering. 2014. 3(2). p.5471-5476.

. Yongjie, Tan, and Zhou Wengang. Image scrambling degree evaluation algorithm based on grey relation analysis. In Computational and Information Sciences (ICCIS), 2010 International Conference on, IEEE, 2010 p. 511-514.

. Yun-Peng, Zhang, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan, and Dai Wei-di. Digital image encryption algorithm based on chaos and improved DES. In Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on, IEEE, 2009.p. 474-479.

. Shreef, Mohammed A., and Haider K. Hoomod. Image Encryption Using Lagrange-Least Squares Interpolation. (IJACSIT). International Journal of Advanced Computer Science and Information Technology. 2013 2(4).p. 35-55.

. Shah, Jolly, and Vikas Saxena. Performance Study on Image Encryption Schemes. (IJCSI) International Journal of Computer Science. 2011. 8(4).p.349-355.

. Samanta, Sabyasachi, Saurabh Dutta, and Goutam Sanyal. An enhancement of security of image using permutation of RGB-components. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on, vol. 2, IEEE, 2011. p. 404-408.

. Saini, Jaspal Kaur, and Harsh K. Verma. A hybrid approach for image security by combining encryption and steganography. In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, IEEE, 2013. p. 607-611.

. Kekre, H. B., Tanuja Sarode, and Pallavi Halarnkar. Performance Evaluation of Digital Image Encryption Using Discrete Random Distributions and MOD Operator. IOSR-JCE. IOSR Journal of Computer Engineering. 2014. 16(2).Ver V. p.54-68.

. Dey, Somdip. "SD-AEI: An advanced encryption technique for images." InDigital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, pp. 68-73. IEEE, 2012.




How to Cite

Kekre, H. B., Sarode, T., & Halarnkar, P. (2014). A Novel Framework for Information Hiding and Image Encryption using Least Significant Bit Techniques. European Journal of Applied Sciences, 2(3), 10–25. https://doi.org/10.14738/aivp.23.265