Development of multi-level system of steganography


  • Tunde Joseph Ogundele Department of Computer Science, Federal University of Technology Akure, Nigeria
  • Adebayo Olusola Adetunmbi Department of Computer Science, Federal University of Technology Akure, Nigeria


Steganography, Cryptography, Encoding, Image, Encryption, Decryption, Compression


Internet world is characterized by many users among which are crackers and thieves. Hence, the need for a secured system to safely exchange confidential information among users across the web is required. Of such tool is steganography that simply hides the user information under other kind of information such as image so that no one suspects that a sensitive data is being transferred. This paper presents a steganography scheme with an improved capacity and enhanced security by compressing the information before embedding it under an image. This is done by encoding the message before embedding it in the blue object of the cover image components (pixels). To prove this scheme, several testing are performed and results are compared.


Download data is not yet available.


[1] Internet–Wkipedia,, 2011
[2] Minakshi Kumar (2011), Digital Image Processing: Photogrammetry and Remote Sensing Division, Indian Institute of Remote Sensing, Dehra Dun
[3] Saurabh S. and Gaurav A (2010), Use of image to secure text message with the help of LSB replacement: ISSN 0976-4259, Invertis Institute of Engineering and Technology, Bareilly India.
[4] Muhalim M, Subariah I, Mazleena S and Mohd R (2003), Information Hiding Using Steganography: Department of Computer System & Communication, Faculty of Computer Science and Information system, University Teknologi Malaysia, 2003.
[5] Rupinder K, Mandeep K, Rahul M (2011), A New Efficient Approach towards Steganography: ISSN 0975-9646, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (2), 2011, 673-676
[6] Shiva-Kumar K, Raja K, and Sabyasachi P (2011), Hybrid Domain in LSB Steganography: International Journal of Computer Applications (0975 – 8887) Volume 19– No.7, April 2011
[7] Amanpreet K, Renu D, Geeta S (2009), A new Image Steganography Based on First Component Alteration Technique: International of Computer Science and Information Security. Vol 6, No 3, 2009
[8] Wu D. and Tsai W (2003), A Steganographic Method for Images by Pixel-value differencing. Pattern Recognition Letters
[9] Natarajan M and Lopamudra N (2010), Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media: International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010.
[10] D. Stinson, Cryptography: Theory and Practice, 2 nd Edition, Chapman and Hall, CRC, February 2002.
[11] Bret Dunbar, A detailed look at Steganographic Techniques and their use in Open-Systems Environment, SANS Institute. January 2002
[12] Neil J and Sushil J, Exploring Steganography: Seeing the Unseen: 0018-9162/98 IEEE 1998
[13] Debrup Banerjee, Assymetric Key Steganography: 2011 International Conference on Information and Electronics Engineering, IPCSIT vol 6, 2011.
[14] Steganography–Wikipedia,
[15] Donal O, Micheal P and Hitesh T (2001), Electronic Payment Systems for E-Commerce: ISBN 1-58053-463-5, Artech House Inc.




How to Cite

Ogundele, T. J., & Adetunmbi, A. O. (2013). Development of multi-level system of steganography. Journal of Computer Science and Technology, 13(01), p. 25–31. Retrieved from



Original Articles