Md. Nahid Sultan

Work place: Department of Computer Science and Engineering, Hajee Mohammad Danesh Science and Technology University, Dinajpur-5200, Bangladesh



Research Interests: Image Processing, Computational Learning Theory, Artificial Intelligence, Medical Informatics


Nahid Sultan received the Bachelor of Science in Computer Science and Engineering from Islamic University (IU), kushtia-7003, Bangladesh in the year of 2011. He received M.Sc. in Computer Science and Engineering from Islamic University (IU), kushtia-7003, Bangladesh in the year of 2012. From February 2015 to September 2015 he worked on a Private University name UITS as a Lecturer in the country. In September 2015, he joined as a Lecturer in the department of Computer Science and Engineering, HSTU, Dinajpur-5200, Bangladesh. Then, he became an Assistant Professor in September 2017. His research interest includes Artificial Intelligence, Machine Learning, Cognitive Radio Network, Image Processing, Bio-informatics, and Internet of Things.

Author Articles
A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload

By U. A. Md. Ehsan Ali Emran Ali Md. Sohrawordi Md. Nahid Sultan

DOI:, Pub. Date: 8 Aug. 2021

Security in digital communication is becoming more important as the number of systems is connected to the internet day by day. It is necessary to protect secret message during transmission over insecure channels of the internet. Thus, data security becomes an important research issue. Steganography is a technique that embeds secret information into a carrier such as images, audio files, text files, and video files so that it cannot be observed.  In this paper, based on spatial domain, a new image steganography method is proposed to ensure the privacy of the digital data during transmission over the internet. In this method, least significant bit substitution is proposed where the information embedded in the random bit position of a random pixel location of the cover image using Pseudo Random Number Generator (PRNG). The proposed method used a 3-3-2 approach to hide a byte in a pixel of a 24 bit color image. The method uses Pseudo Random Number Generator (PRNG) in two different stages of embedding process. The first one is used to select random pixels and the second PRNG is used select random bit position into the R, G and B values of a pixel to embed one byte of information. Due to this randomization, the security of the system is expected to increase and the method achieves a very high maximum hiding capacity which signifies the importance of the proposed method.

[...] Read more.
Other Articles