Hiding Random text using Steganography


The introduction of steganography has brought a lot of improvement to information security. Security issues is taken into account a significant concern which is why management systems offices still opt to follow the normal way of addressing record keeping. This study aims to ensure data security using Steganography.

The method used in for the steganography technique in this study is the RGB techniques, as every pixel is considered to be a combination of RGB. The entire message to be hidden is split-ed into equal 2-bit values and embedded in the red pixel value of the image. This is passed until the end of the image. The message length is also embedded in the image by the software solution designed. The same software must be used to receive, decode the image, and extract the message.

The result of this study is presented as a software solution and the images used for information hiding are not limited to any type of image as images from different sources and types can be used for hiding text, also the image used for steganography resulted in having higher dimension size as this compensates for the addition security level.

In conclusion, the steganography system is aimed to protect the confidentiality of data and present it as an image as this will not easily attract security threats.

  • Steganography,
  • Plaintext,
  • Ciphertext
  • Zinah Talaat Rashid AL-Windawi. “Security Enhancement of Image Steganography Using Embedded Integrity Features”. Master in Computer Science, Middle East University. May, 2017.
  • American Journal of Engineering Research (AJER) e-ISSN : 2320- 0847 p-ISSN : 2320-0936 Volume-02, Issue-11, pp-122-128 Steganography: A Review of Information Security Research and Development in Muslim World YunuraAzuraYunus, SalwaAbRahman, Jamaludin Ibrahim Kuliyyah of Information and Communication Technology International Islamic University Malaysia.
  • Dipti Kumari, Pradeep Kumar, Dr. Meena Arora, “A Review: Hiding Text in Image Using different Steganography Approaches. International Journal of Research and Scientific Innovation Volume IV, Issue VS, May 2017. ISSN 2321-2705. Pg 69-73.
  • Kolapo Ridwan Olayinka and Sakpere Wilson. “Towards Securing Electronic Health Records Using Ceasar and Affine Cryptographic Techniques” International Journal for Research Trends and Innovation, Volume 7, Issue 12, 2022. ISSN: 2456- 3315. Pg 46-50.
  • Wenjie Lin, Xueke Zhu, Wujian Ye, Chin-Chen Chang, Yijun Liu and Chengmin Liu. “An Improved Image SteganographyFramework Based on Y Channel Information for Neural Style Transfer”. IEEE Volume 2022, Article ID 2641615.
  • Shashikala Channalli, Ajay Jadhav. “Steganography An Art of Hiding Data”.
  • International Journal on Computer Science and Engineering Vol.1(3), 2009, 137-141
  • Ritu Sindhu and Pragati Singh. “Information Hiding using Steganography”.
  • International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249
  • – 8958 (Online), Volume-9 Issue-4, April, 2020. Pg 1549-1554.
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

How to Cite

KOLAPO RIDWAN OLAYINKA. (2023). Hiding Random text using Steganography. International Journal of Multidisciplinary Research and Studies, 6(09), 01–13.

Download Citation


Download data is not yet available.

Similar Articles

You may also start an advanced similarity search for this article.