Choosing a steg method:

An Overview

Why LSB?

Implementing LSB

Breaking LSB - Sample Pair analysis

LSB matching or ±1 embedding

Summary of methods

[1] Aini DN, Setiadi DRIM, Putro SN, et al (2019) Survey of methods in the spatial domain image steganography based imperceptibility and payload capacity
[2] Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods.
[3] Hussain M, Wahab AWA, Bin IYI et al (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012
[4] Setiadi DRIM (2019) Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J King Saud Univ - Comput InfSci https://doi.org/10.1016/j.jksuci.2019.12.007
[5] Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation.https://doi.org/10.24425/ijet.2019.126313
[6] Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76:7973–7987. https://doi.org/10.1007/s11042-016-3449-4
[7] Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76:8597–8626.https://doi.org/10.1007/s11042-016-3383-5
[8] Astuti YP, Setiadi DRIM, Rachmawanto EH, Sari CA (2018) Simple and secure image steganography using LSB and triple XOR operation on MSB. In: 2018 International conference on information and communications technology, ICOIACT 2018. Yogyakarta
[9] Setiadi DRIM, Santoso HA, Rachmawanto EH, Sari CA (2018) An improved message capacity and security using divide and modulus function in spatial domain steganography. In: 2018 international conference on information and communications technology (ICOIACT). IEEE, Yogyakarta, pp 186–190
[10] S. Dumitrescu, X. Wu, and N. D. Memon. On steganalysis of random LSB embedding in continuous-tone images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, pages 324–339, Rochester, NY, September 22–25, 2002
[11] Harmsen and W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 131–142, Santa Clara, CA, January 21–24, 2003.