<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>cujse</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Cankaya University Journal of Science and Engineering</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2564-7954</issn>
                                                                                            <publisher>
                    <publisher-name>Cankaya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Saran</surname>
                                    <given-names>Nurdan</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Olcay</surname>
                                    <given-names>Cem</given-names>
                                </name>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20130501">
                    <day>05</day>
                    <month>01</month>
                    <year>2013</year>
                </pub-date>
                                        <volume>10</volume>
                                        <issue>1</issue>
                                                
                        <history>
                                    <date date-type="received" iso-8601-date="20130501">
                        <day>05</day>
                        <month>01</month>
                        <year>2013</year>
                    </date>
                                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2009, Cankaya University Journal of Science and Engineering</copyright-statement>
                    <copyright-year>2009</copyright-year>
                    <copyright-holder>Cankaya University Journal of Science and Engineering</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Digital image steganography techniques deal with three subjects lossy/losslesscompressed images, uncompressed images. Steganography techniques embed secret datapixel directly into uncompressed and lossless compressed cover images. The most populardata hiding method is, changing pixels’ left most digits or last two, known as LeastSignificant Bit (LSB). Lossless image formats like .bmp, .png, and 8-bit gray-scale .gif areusable for LSB methods. LSB embedding method is not usable for palette images becauseof changing just last bit of a pixel causes a big difference on image. After embedding all ofsecret message to palette image, Human Visual System (HVS) can detect manipulationson image. In this study, we compare some of the most popular LSB techniques; Chan’salgorithm [3], 2/3 efficient embedding [4], matrix embedding for large payloads [5], imageblocks method [6] and pixel-value differencing method [7]-[8].</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>LSB technique</kwd>
                                                    <kwd>  steganography</kwd>
                                                    <kwd>  information hiding</kwd>
                                                    <kwd>  digital image steganography</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
