INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue XII, December 2025
An MSE measure of 0.0000368 suggests that there is minimal distortion between the cover image and the stego
image as this value is very low. Further, a PSNR of 92.47 dB indicates that the quality of a Stego Image is nearly
equivalent to that of the original Image, which is also referred to as the Cover image. Using the LSB technology
(Least Significant Bit) to hide data in text-based Steganography will produce a very high success rate with
respect to securely hiding sensitive information while keeping it safe without anyone ever knowing that it was
inserted into the data.
FUTURE DIRECTION
The field of image steganography continues to provide vast opportunities for innovation and practical
applications in secure communications. Future research may focus on developing more powerful and intelligent
algorithms that improve both the ability and ambiguity of hidden information. Advanced techniques such as
adaptive LSB methods, transform domain embedding (DCT, DWT), and hybrid methods can make detection by
steganalysis significantly harder, thereby increasing security. The integration of machine learning and artificial
intelligence can allow for dynamic selection of optimal embedding locations, thus creating hidden data that will
be better protected from common image processing activities (e.g., compression, filtering, and resizing).
Furthermore, the usage of steganography with cryptographic techniques will produce an even higher level of
security because the information will remain indiscernible even when detected without using the appropriate
decryption key. As the volume of digital media and content on the internet continues to grow at an exponential
rate, the potential applications of steganography are now being extended into web-based applications, social
media sites, and cloud storage. Therefore, secure data transmission can occur instantaneously in such settings
too. The authors also recommended that researchers explore the possibility of using multi-modal types of
steganography, meaning embedding information in multiple formats or media (such as text, image, audio)
simultaneously to provide more variety and security for transmitted messages. Furthermore, future work will be
directed toward stealth optimisation that seeks to minimise the overall statistical footprint of all hidden data and
therefore challenges advanced steganalysis systems. Steganography can also be embedded into IoT networks
and smart devices to facilitate safe and private communication in otherwise secure environments, such as those
found in defence, healthcare and critical infrastructure sectors. Therefore, the ongoing development of image
steganography will provide a significant contribution to the fields of Cybersecurity, Digital Rights Management,
and Exchange of Confidential Information, making it one of the most important areas being researched and
developed in today's rapidly changing Digital World.
CONCLUSION
This paper demonstrates a safe and efficient technique that uses LSB-based steganography to hide messages in
color images. By embedding encrypted secret text in the least significant bits of the pixel values, the proposed
system successfully achieves high opacity while maintaining the visual quality of the Stego image. Experimental
evaluation using objective image quality metrics, such as mean squared error (MSE) and peak signal-to-noise
ratio (P. S. N. R) shows that the distortion introduced by the embedding process is minimal, which is very low
M. S. E-value and similarly high P. S. N. R and defined by value. This confirms that the primary objective of
this project, to create a stego image that is visually indistinguishable from its cover image, has been
accomplished. Furthermore, by adding an encryption layer to the embedding process, the security of the overall
system is enhanced because even if someone detects the presence of hidden data before it is placed in a cover
image, they will not be able to decipher it without having the decryption key. Due to its low computational costs,
uncomplicated nature and ability to create the desired effect, it is possible for this method to be used in the real
world for Secure Communication Themes (eg Confidentiality & Obfuscation). Overall, the proposed method
provides a balanced solution between data protection, embedding capabilities, and image quality, thereby
verifying the suitability of LSB-based steganography for secure text transmission.
ACKNOWLEGMENT
I would like to express my sincere gratitude to, Dr. Soumendu Banerjee, Assistant Professor in the Computer
Science Department, who provided me with infinite advice, insight, and encouragement throughout my research.
Page 1562