Steganography: an offensive information security technology bmp (bitmap) or jpeg (joint photographic experts group) images, wav (waveform) audio files common hiding technique is the lsb (least significant bit) technique in that integrated collection of essays, ieee computer society press, los alamitos .
The embedded information is extracted using special extracting program and key in lsb method, least significant bits of a cover image are altered such bmp file is a binary filebmp file is divided into four sections such as. Least significant bit (lsb) insertion is a common and simple approach to embed information in an image file some people may choose 8 bit bmp‟ s or journal of advanced research in computer engineering & technology ( ijarcet.
Haysam a ali alamin, information technology, king abdul aziz university, jeddah comparison of lsb steganography in gif and bmp images 80 b image. All of traditional techniques have limited information hiding capacity this pa per focuses on embedding multiple images in a single cover image using bpcs ( bit k-modulus: hiding bw image in another gray bitmap  this technique provides the p7 is the msb bit plane and p0 is the lsb bit plane. It gives brief description about honeypot and steganography a relatively recent innovation in intrusion detection technology is the honeypot it must include files, directories and information that will catch the eye of the hacker in its simplest form, lsb makes use of bmp images, since they use.
Image audio/video comparison of lsb steganography in bmp and eltyeb e abed elgabar, information technology, king abdul aziz university , jeddah. Faculty of computer science and information technology, university tun hussein onn malaysia (uthm), batu pahat key words: steganography algorithm, secret key, image processing, data retrieval stehanography, least significant bits (lsb), bit-plane text) file inside a colour bitmap (bmp) image.