Implementation of embedded messages using steganography in the PHP software package

9th International Scientific Conference Technics and Informatics in Education – TIE 2022 (2022) стр. 171-176

АУТОР(И): Marija Mojsilović, Selver Pepić, Goran Miodragović

Download Full Pdf 

DOI: 10.46793/TIE22.171M


The term steganography is usually associated with hiding and concealing information and messages. People, and even IT professionals, very rarely come into contact with steganography and steganalysis. Only messages are protected by cryptographic protection, while steganography can be said to protect both messages and parties participating in the communication. Steganography also means hiding messages inside computer files and data streams. This paper provides an overview of the implementation of embedded messages using steganography in the PHP software package. Emphasis is placed on hiding information, i.e. messages in JPEG images. As well as decoding or reading a hidden message. The field of steganography is naturally linked to the field of steganalysis, the primary goal of which is the detection of a hidden message, and then its extraction from the object of the message carrier. The most commonly used method for hiding messages is LSB, it is a method that changes the least significant bits to match the secret message. Then, by passing the steganographic key, the message is encrypted using the RC4 algorithm.


Cryptography; Steganalysis; Steganography; JPEG; PHP


  • [1] Takashi, M., (2020) Misdirection steganography, Soft Computing, 24:16005–16010.
  • [2] Harianto, A., & Prasad, P. W. C. & Abeer, A., (2019), Implementation of cryptography in steganography for enhanced security Multimedia Tools and Applications, 78:32721–32734.
  • [3] Mukesh, D., Mamta, J., (2021), A survey on information hiding using video steganography Artificial Intelligence Review, 54:5831–5895.
  • [4] Veinović, M., Adamović, S., (2020) Kriptologija I, Univerzitet Singidunum, Beograd.
  • [5] Chandramouli, R., Subbalakshmi, K., (2004), Current trends in steganalysis: a critical survey, Control, Automation, Robotics, and Vision Conference, ICARCV 2004, Svezak 2, Str. 964-967.
  • [6] Bruce, S., (2007), Primenjena kriptografija: protokoli, algoritmi i izvorni kod na jeziku C, Mikro knjiga, Beograd.
  • [7] Zeljković, S., (2005), Steganografija, Hrvatski matematički elektronski časopis math.e, Broj 5, Lipanj; Dostupno na:
  • [8] Gautam, R., (2016), Analysis and implementation of WHOIS domain lookup. International Journal of Technical Research & Science.
  • [9] Julie C., M., (2018), PHP, MySQL i JavaScript, IV izdanje, Kompjuterska biblioteka, Beograd.
  • [10] Katzenbeisser, S., Petitcolas, F., (2020), Information Hiding Techniques for Steganography and Digital Watermarking, Arch House, Boston.
  • [11] Curran, K. Bailey, K., (2003), An evaluation of image-based steganography methods, International Journal of Digital Evidence.
  • [12] Ibrahim, A., (2007), Steganalysis in Computer Forensic, School of Computer and Information Science, Edith Cowan University.
  • [13]