To see the other types of publications on this topic, follow the link: Indicator-based least significant bit (LSB) method.

Journal articles on the topic 'Indicator-based least significant bit (LSB) method'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Indicator-based least significant bit (LSB) method.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Myo, Ma Ma, Zar Hnin Zar, and Min Htwe Yin. "Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 970–74. https://doi.org/10.5281/zenodo.3589923.

Full text
Abstract:
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdf
APA, Harvard, Vancouver, ISO, and other styles
2

Rafailov, Radostin. "Parallel steganographic algorithm based on least significant bit." E3S Web of Conferences 508 (2024): 04018. http://dx.doi.org/10.1051/e3sconf/202450804018.

Full text
Abstract:
The paper suggests a parallel algorithm for the implementation of the LSB steganographic method. The possibilities of parallel programming are presented. The proposed steganographic parallel algorithm is compared to an algorithm using sequential embedding of the hidden message (using one-core processor). It is established that the algorithm produces accurate statistical results.
APA, Harvard, Vancouver, ISO, and other styles
3

Canistya Chandra, Putu Isthu, and I. Ketut Gede Suhartana. "Web-based Image Steganography Application to Hide Secret Messages." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (2021): 375. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p08.

Full text
Abstract:
The Internet has become a very popular medium for communicating and exchanging information data. However, with the development of technology, information data theft is becoming more frequent so it is very necessary to maintain the security of information data. To maintain the security of information data, steganography can be used, namely hiding data or information to a medium. Least Significant Bit (LSB) is a method that can be used to perform the insertion. The Least Significant Bit (LSB) replaces the insignificant or smallest bit value so that when an insertion is done, the difference is not clear. So, this research aims to make a steganography application using the Least Significant Bit (LSB) method.
APA, Harvard, Vancouver, ISO, and other styles
4

Kurniasih, Firda, Rini Marwati, and Ririn Sispiyati. "Penggabungan Affine Cipher dan Least Significant Bit-2 untuk Penyisipan Pesan Rahasia pada Gambar." Jurnal EurekaMatika 11, no. 2 (2023): 79–88. http://dx.doi.org/10.17509/jem.v11i2.62115.

Full text
Abstract:
As technology develops, improving message security is very important. One approach that can be taken to improve message security is to combine cryptography and steganography. In this study, the authors combined Affine Cipher cryptographic and Least Significant Bit-2 (LSB-2) steganography. In this merge method, the Affine Cipher cryptography is applied first, then, the encrypted message is inserted into an image using LSB-2. Specifically, LSB-2 is a modification of the Least Significant Bit (LSB) method which works by exchanging the sixth bits of each pixel color element in the image with the bits of the secret message. The LSB-2 used is a random LSB-2. In this case, the random numbers are generated by the Pseudo Random Number Generator (PRNG). The results of this research are a computer application with the Python language version 3.11 which can disguise messages and insert them in an image. Based on the implementation, the combination Affine Cipher and LSB-2 can complicate cryptanalysis because it has to hack two algorithms and the message is hidden randomly in an image.Keywords: Affine Cipher, Cryptography, LSB-2, Message Security, Steganography. AbstrakSeiring berkembangnya teknologi, peningkatan keamanan pesan menjadi sangat penting. Salah satu pendekatan yang dapat dilakukan untuk meningkatkan keamanan pesan adalah dengan menggabungkan kriptografi dan steganografi. Pada penelitian ini, penulis melakukan penggabungan antara teknik kriptografi Affine Cipher dan steganografi Least Significant Bit-2 (LSB-2). Dalam metode penggabungan ini, keamanan pesan dilakukan dengan menerapkan kriptografi Affine Cipher terlebih dahulu. Kemudian, pesan yang telah dienkripsi disisipkan ke dalam citra menggunakan LSB-2. Lebih spesifiknya, LSB-2 merupakan modifikasi dari metode Least Significant Bit (LSB) dengan menukarkan bit ke enam dari setiap elemen warna pixel pada gambar dengan bit-bit dari pesan rahasia yang ingin disembunyikan. LSB-2 yang digunakan merupakan LSB-2 secara acak. Bilangan acak yang diperlukan dalam proses ini dihasilkan melalui Pseudo Random Number Generator (PRNG). Hasil penelitian ini berupa aplikasi komputer dengan bahasa pemrograman Python versi 3.11 yang dapat menyamarkan pesan dan menyisipkannya dalam gambar. Berdasarkan implementasi, diperoleh hasil bahwa penggabungan Affine Cipher dan LSB-2 dapat mempersulit kriptanalisis karena harus meretas dua algoritma dan pesan disembunyikan secara acak keberadaannya di dalam gambar.
APA, Harvard, Vancouver, ISO, and other styles
5

Nashat, Dalia, and Loay Mamdouh. "A Least Significant Bit Steganographic Method Using Hough Transform Technique." Journal of Networking and Network Applications 3, no. 2 (2023): 73–80. http://dx.doi.org/10.33969/j-nana.2023.030203.

Full text
Abstract:
Steganography is a data-hiding scientific branch that aims to hide secret data in an image, video, or audio. Image steganography methods try to embed a large amount of data into images with high imperceptibility. However, increasing the number of embedded data in the image decreases its quality. Therefore, in this paper, a new method based on Least Significant Bit (LSB) using Hough Transform is proposed to improve the stego image quality with increasing the amount of embedded data. The LSB is the common embedding steganography method due to its simplicity of implementation and low complexity. The proposed method inverts the LSBs of image pixels to enhance the quality of stego image. First, improved edge detection filter is used to detect edges areas. Then, we invert LSBs for the pixel in edge area pixels. Finally, the LSBs smooth area pixels of the cover image are inverted. The performance of the presented method is evaluated for the stego image quality and the amount of embedded data. The results show that the new method has better performance in comparison with the current methods in terms of Peak Signal-to-Noise Ratio (PSNR) and capacity.
APA, Harvard, Vancouver, ISO, and other styles
6

Hsing-Han Liu, Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, and Tai-Hsiu Wu Sheng-Chih Ho. "An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution." 網際網路技術學刊 24, no. 5 (2023): 1027–41. http://dx.doi.org/10.53106/160792642023092405002.

Full text
Abstract:
<p>This work presents a steganographic scheme based on Laplacian-of-Gaussian (LoG) edge detection and least significant bit (LSB) substitution. The cover image is first divided into continuous and non-overlapping 4×4-pixel blocks. The pixel at the top left corner of each block (first pixel) is defined as the reference pixel. After the LoG edge detection, the blocks are classified as edge or non-edge blocks, and this information is embedded in the reference pixels. Each non-reference pixel is then embedded with 5 bits and 4 bits of cipher text if it belongs to an edge block or non-edge block, respectively. Compared to the method of Tseng and Leng, Bai et al., and Ghosal et al., proposed method increased the capacity by 39.6%, 7.3%, and 42.7%, respectively, in the “Lena” cover image. To test the generalizability of our method, an embedding capacity and image quality test were conducted using 10,000 512 × 512 sized greyscale images from the BOSSBase dataset. Compared to the aforementioned previous methods, our method improved the capacity by 33.9%, 2.7%, and 36.1%, respectively, while maintaining an acceptable stego-image quality. Finally, proposed method can resist the detection of RS, pixel difference histogram analysis and second order SPAM features.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
7

Abdullah, Sarah Faeq, and Shahir Fleyeh Nawaf. "Optimizing Data Security with Hybrid Scheme Based on LSB and DWT." Tikrit Journal of Engineering Sciences 30, no. 3 (2023): 190–99. http://dx.doi.org/10.25130/tjes.30.3.17.

Full text
Abstract:
One of the most popular techniques in image steganography is the Least Significant Bit (LSB) operation, which involves inserting secret data into the cover image's pixels' least significant bit. However, the amount of secret data that can be concealed in the cover image depends on the number of bits used for embedding. In this paper, a novel hybrid steganographic system based on Discrete Wavelet Transform (DWT) and Least Significant Bit (LSB) for image steganography is proposed. The proposed scheme aims to optimize data security by utilizing LSB and DWT techniques to embed secret data into an image robustly and efficiently. The present paper focuses on evaluating the algorithm performance by comparing the encrypted image quality using metrics such as PSNR, RMSE, and SSIM. The experimental results showed that the suggested method outperforms the existing LSB-based in terms of security performance. These results indicated that the proposed method consistently outperforms the conventional LSB-based method across all bit depths tested, with an overall improvement of 14.12% in PSNR, 41.87% in RMSE, and 4.02% in SSIM over the traditional LSB. The proposed method enhanced the PSNR values, reduced the RMSE values, and increased the SSIM values for all bit depths tested, indicating higher image fidelity, less distortion, and better preservation of structural similarity of the original image.
APA, Harvard, Vancouver, ISO, and other styles
8

Hutabarat, Allwine, and Riza Sawitri. "Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography." Jurnal Pepadun 5, no. 3 (2024): 286–98. https://doi.org/10.23960/pepadun.v5i3.246.

Full text
Abstract:
Computer networks and the internet are growing rapidly, enabling global communication and exchange of information, including text, images, video and audio. However, this progress has also fueled cybercrime, such as data theft. One solution to protect data is steganography, the art of hiding a message in another medium. With the advancement of digital technology, steganography now utilizes digital image files as hidden message containers. Chaotic LSB (Least Significant Bit) based steganography method is implemented in this steganography application. This technique determines the location of message concealment randomly, increasing the security of sending secret data over the internet without being detected. The LSB method allows hidden messages to be accessed only by those who have a special key. The advantage of this method lies in its ability to keep the message secret from unauthorized parties. Thus, the LSB method becomes an important tool for preventing unauthorized access and ensuring the security of confidential data transmission.
APA, Harvard, Vancouver, ISO, and other styles
9

Khalid, Kadhim Jabbar, Bahir Tuieb Munthir, and A. Thajeel Salam. "Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545–58. https://doi.org/10.11591/ijece.v12i6.pp6545-6558.

Full text
Abstract:
Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message.
APA, Harvard, Vancouver, ISO, and other styles
10

Susilawati Mohamad, Fatma, and Nurul Sahira Mohd Yasin. "Information Hiding Based on Audio Steganography using Least Significant Bit." International Journal of Engineering & Technology 7, no. 4.15 (2018): 536. http://dx.doi.org/10.14419/ijet.v7i4.15.28363.

Full text
Abstract:
Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. A few problems arise especially in securing data and information when the information had been lost or stolen from unauthorized user. Traditionally, we give information manually using paper; it is possible that the information could be stolen by unauthorized user. The main objective of this study is to hide secret information in audio, so that other persons will not notice the presence of the information. The proposed method of this study is by using Least Significant Bit (LSB) algorithm to design an audio steganography. In the proposed method, each audio sample is converted into bits and then the text data is embedded. The expected result of this study will produce a steganography audio that will be able to hide data or information efficiently from unauthorized user, also to ensure the safety of the information in an authorized hand.
APA, Harvard, Vancouver, ISO, and other styles
11

Modupe, Alade Oluwaseun, Amusan Elizabeth Adedoyin, and Adedeji Oluyinka Titilayo. "A Comparative Analysis of LSB, MSB and PVD Based Image Steganography." International Journal of Research and Review 8, no. 9 (2021): 373–77. http://dx.doi.org/10.52403/ijrr.20210948.

Full text
Abstract:
Steganography is the art and science of hiding information by embedding data into cover media. Numerous techniques are designed to provide the security for the communication of data over the Internet. A good steganographic algorithm is recognized by the performance of the techniques measured with the support of the performance metrics among which are PSNR, MSE, SSIM, robustness and capacity to hide the information in the cover image. In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed. Three different cover images was used to hide secret message. A comparative performance analysis of LSB, MSB and PVD methods used in image steganography was performed using peak signal to noise ratio (PSNR), Mean square error (MSE) and Structural Similarity index (SSIM) as performance metrics. LSB technique gives higher PSNR and SSIM values than MSB and PVD method with lower MSE than the other two techniques. Future research can be geared towards investigating the embedding capacity, security, and computational complexity of each technique. Keywords: Least Significant Bit (LSB), Most Significant Bit (MSB), Pixel value differencing (PVD), PSNR, SSIM and MSE,
APA, Harvard, Vancouver, ISO, and other styles
12

Yunus, Mahmuddin, and Agus Harjoko. "Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, no. 1 (2014): 81. http://dx.doi.org/10.22146/ijccs.3498.

Full text
Abstract:
AbstrakPenyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB) dan Discrete Cosine Transform (DCT). Dalam penelitian ini dilakukan penyembunyian data pada file video dengan menggunakan metode LSB, metode DCT, dan gabungan metode LSB-DCT. Sedangkan kualitas file video yang dihasilkan setelah penyisipan dihitung dengan menggunakan Mean Square Error (MSE) dan Peak Signal to Noise Ratio (PSNR).Uji eksperimen dilakukan berdasarkan ukuran file video, ukuran file berkas rahasia yang disisipkan, dan resolusi video.Hasil pengujian menunjukkan tingkat keberhasilan steganografi video dengan menggunakan metode LSB adalah 38%, metode DCT adalah 90%, dan gabungan metode LSB-DCT adalah 64%. Sedangkan hasil perhitungan MSE, nilai MSE metode DCT paling rendah dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan metode LSB-DCT mempunyai nilai yang lebih kecil dibandingkan metode LSB. Pada pengujian PSNR diperoleh databahwa nilai PSNR metode DCTlebih tinggi dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan nilai PSNR metode gabungan LSB-DCT lebih tinggi dibandingkan metode LSB. Kata Kunci—Steganografi, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) AbstractHiding data in video files is known as video steganography. Some of the well known steganography methods areLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) method. In this research, data will be hidden on the video file with LSB method, DCT method, and the combined method of LSB-DCT. While the quality result of video file after insertion is calculated using the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experiments were conducted based on the size of the video file, the file size of the inserted secret files, and video resolution.The test results showed that the success rate of the video steganography using LSB method was 38%, DCT method was 90%, and the combined method of LSB-DCT was 64%. While the calculation of MSE, the MSE method DCT lower than the combined method of LSB and LSB-DCT method. While LSB-DCT method has asmaller value than the LSB method. The PNSR experiment showed that the DCT method PSNR value is higher than the combined method of LSB and LSB-DCT method. While PSNR combined method LSB-DCT higher compared LSB method. Keywords—Steganography, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)
APA, Harvard, Vancouver, ISO, and other styles
13

Hutapea, Destri Yanti, and Octaviani Hutapea. "WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING." International Journal of Remote Sensing and Earth Sciences (IJReSES) 15, no. 1 (2018): 63. http://dx.doi.org/10.30536/j.ijreses.2018.v15.a2824.

Full text
Abstract:
Remote sensing satellite imagery is currently needed to support the needs of information in various fields. Distribution of remote sensing data to users is done through electronic media. Therefore, it is necessary to make security and identity on remote sensing satellite images so that its function is not misused. This paper describes a method of adding confidential information to medium resolution remote sensing satellite images to identify the image using steganography technique. Steganography with the Least Significant Bit (LSB) method is chosen because the insertion of confidential information on the image is performed on the rightmost bits in each byte of data, where the rightmost bit has the smallest value. The experiment was performed on three Landsat 8 images with different area on each composite band 4,3,2 (true color) and 6,5,3 (false color). Visually the data that has been inserted information does not change with the original data. Visually, the image that has been inserted with confidential information (or stego image) is the same as the original image. Both images cannot be distinguished on histogram analysis. The Mean Squared Error value of stego images of all three data less than 0.053 compared with the original image. This means that information security with steganographic techniques using the ideal LSB method is used on remote sensing satellite imagery.
APA, Harvard, Vancouver, ISO, and other styles
14

Ganesh, R., and S. Thabasu Kannan. "A Capable System for Hiding Image in an Image." Asian Journal of Engineering and Applied Technology 6, no. 2 (2017): 14–17. http://dx.doi.org/10.51983/ajeat-2017.6.2.822.

Full text
Abstract:
In this paper, we have proposed a new method by for hiding an image using steganographic called GanKan. This method is based on Least Significant Bit (LSB) replacement and can be used for 24 bit color image capable of producing a secret-embedded image. This paper clearly showed that this GanKan new method is better than LSB technique for 8 bit color image and 24 bit color image. Firstly LSB method for both 8 bit and 24 bit color image are described and then the GanKan method for 24 bit color image, compare their result by calculating Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), Root Mean Square Error (RMSE) and histogram analysis. LSB Algorithm embedded MSB of secret image into LSB of cover image. In the case of 24 bit color image two methods are described. In first method, last 2 LSB of each plane (RGB) of cover image, is replaced by 2 MSB of secret image. In the second method, last LSB of each red plane is replaced by first MSB of secret image, last 2 LSB of each green plane by next 2 MSB of secret image and then last 3 LSB of blue plane is replaced by next 3 MSB of secret image. This means that total 6 bits of secret image can be hided in 24 bit color image. Experimental results showed that the embedded-image is visually indistinguishable from the original cover-image in the case of 24 bit.
APA, Harvard, Vancouver, ISO, and other styles
15

Juneja, Kapil. "Region Secure and Pattern Based Alternate 2B-3C Steganography Approach for Data Security in Color Images." International Journal of Sensors, Wireless Communications and Control 9, no. 3 (2019): 330–44. http://dx.doi.org/10.2174/2210327909666181217124423.

Full text
Abstract:
Background and Objective: The public and group communication carried out in the social, cloud, and mobile networks suffer from unauthorized users. The data security is required for secure authentication, monetary transactions and other sensitive information. The steganography methods empower the user with invulnerable communication in public domain. In this paper, a region secure and pattern based alternate 2B-3C (2Bit-3Channel) Steganography method is proposed to improve the content reliability and data security. Methods: In this method, the cover pixels are retrieved by applying the spiral rectangular pattern over the cover image. This spiral pattern also secures the core content region and the pixels from the core ROI (Region of Interest) is used as a cover only for larger size secret information. In this proposed steganography method, two channels are considered alternatively based on the defined rules. The LSB (Least Significant Bit) of both channels is XOR with input data bits and key to perform data hiding. The method is applied on real time color images taken from COREL and USC-SIPI-ID. The evaluation of proposed steganography approach is done using MSE (Mean Square Error), PSNR (Peak Signal-to-Noise Ratio), BER (Bit Error Rate), NCC (Normalized Cross Correlation) and SSIM (Structural Similarity Index Matrix). Result: The comparative results are generated for 50 real time images against the existing LSB (Least Significant Bit), LSBM (Least Significant Bit Modulation), LSBMR (Least Significant bit Matched Revisited), SCC (Stego Color Cycle), SHSI (Simple Hue-Saturation-Intensity), HIS-MLSB(Simple Hue-Saturation-Intensity-Modified LSB) and IMMEA(Iterative Magic Matrix Encryption Algorithm) methods. Conclusion: The experimentation results verified that the proposed 2B-3C approach improved the data hiding in qualitative and quantitative aspects.
APA, Harvard, Vancouver, ISO, and other styles
16

Mu’azu, Abubakar Aminu, and Kauthar Kabir. "Hybrid of Least Significant Bits and most Significant Bits for Improving Security and Quality of Digital Image Steganography." WSEAS TRANSACTIONS ON COMPUTERS 22 (December 12, 2023): 253–62. http://dx.doi.org/10.37394/23205.2023.22.29.

Full text
Abstract:
The Security of confidential communication is protected using the most popular type of carrier to hold information known as Image steganography. The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are steganography algorithms used for information hiding in digital images both have disadvantages of Low image quality, Security, vulnerability to any small modifications, and long encoding time during message compression. To overcome this limitation, the research proposes a Secured Hybrid algorithm called S-Hybrid to combine (LSB and MSB) bits based on checking Two bits (the least significant bit and the most significant bit) of the cover images and replace them with a secret message which was implemented in Netbeans IDE. However, the S-Hybrid algorithm produced the best stego-image quality. Large cover images made the hybrid algorithm’s quality better. The proposed S-Hybrid had a lesser encoding time than the existing method having the highest compression ratio which reduces the transmission effort making the encoding time short which is correlated to the security and makes the proposed method perform better than the existing one. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work. Mean-squared error (MSE), Peak signal-to-noise ratio (PSNR), encoding time, and Compression ratio are used for performance evaluation between the proposed S-Hybrid algorithm and the existing Method after embedding messages in digital images.
APA, Harvard, Vancouver, ISO, and other styles
17

Win, Win Maw, and San Lwin San. "Text Embedded System using LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1818–22. https://doi.org/10.5281/zenodo.3591533.

Full text
Abstract:
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf
APA, Harvard, Vancouver, ISO, and other styles
18

Della Patresya Sitohang, Purba Lamdippos Hendry Parmadi, Vinela Br Sitepu, and Wilhelmus Wanzerhasratman Gulo. "Video Based Steganography (Motion Vector Steganography)." Jurnal Teknik Indonesia 2, no. 01 (2023): 33–38. https://doi.org/10.58471/ju-ti.v2i01.662.

Full text
Abstract:
Steganography is a technique for hiding information in digital media so that it cannot be detected by third parties. One effective steganography method is Motion Vector Steganography (MVS), which utilizes motion vectors in video compression to insert secret messages. This study implements the Least Significant Bit (LSB) and Most Significant Bit (MSB) methods on motion vectors in videos to insert messages with minimal changes in visual quality. The results of the analysis show that the LSB method has little impact on video quality, while the MSB method is more resistant to steganalysis detection. However, there are challenges such as changes in file format and video size that need to be considered. This study provides insight into the application of video-based steganography and its potential development in the field of information security.
APA, Harvard, Vancouver, ISO, and other styles
19

Youssef, Taouil, and Bachir Ameur El. "Steganographic Scheme Based on Message-Cover matching." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3594–603. https://doi.org/10.11591/ijece.v8i5.pp3594-3603.

Full text
Abstract:
Steganography is one of the techniques that enter into the field of information security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.
APA, Harvard, Vancouver, ISO, and other styles
20

Kadhim Jabbar, Khalid, Munthir Bahir Tuieb, and Salam A. Thajeel. "Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545. http://dx.doi.org/10.11591/ijece.v12i6.pp6545-6558.

Full text
Abstract:
<p><span lang="EN-US">Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
21

Noor Azam, Muhammad Harith, Farida Ridzuan, and M. Norazizi Sham Mohd Sayuti. "A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography." Pertanika Journal of Science and Technology 30, no. 1 (2022): 497–511. http://dx.doi.org/10.47836/pjst.30.1.27.

Full text
Abstract:
Audio steganography is implemented based on three main features: capacity, robustness, and imperceptibility, but simultaneously implementing them is still a challenge. Embedding data at the Least Significant Bit (LSB) of the audio sample is one of the most implemented audio steganography methods because the method will give high capacity and imperceptibility. However, LSB has the lowest robustness among all common methods in audio steganography. To cater to this problem, researchers increased the depth of the embedding level from fourth to sixth and eighth LSB level to improve its robustness feature. However, consequently, the imperceptibility feature, which is commonly measured by Peak Signal to Noise Ratio (PSNR), is reduced due to the trade-off between imperceptibility and robustness. Currently, the lack of study on the estimation of the PSNR for audio steganography has caused the early assessment of the imperceptibility-robustness trade-off difficult. Therefore, a method to estimate PSNR, known as PSNR Estimator (PE), is introduced to enable early evaluation of imperceptibility feature for each stego-file produced by the audio steganography, which is important for the utilisation of embedding. The proposed PE estimates the PSNR based on the pattern collected from the embedment at different levels. From the evaluation, the proposed method has 99.9% of accuracy in estimating PSNR values at different levels. In comparison with the Mazdak Method, the proposed method performs better in all situations. In conclusion, the proposed PE can be used as a reference for embedding and further reducing the calculation complexity in finding the feasible value to minimise the trade-off between robustness and imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
22

Moon, Cheol Woo, Kwang Sub Yoon, and Jonghwan Lee. "A 12~14-Bit SAR-SS Hybrid ADC with SS Bit Shifting Resolution Reconfigurable Method for Bio-Signal Processing." Electronics 12, no. 24 (2023): 4916. http://dx.doi.org/10.3390/electronics12244916.

Full text
Abstract:
This paper presents a low-power, high-resolution reconfigurable hybrid ADC for bio-electrical signal processing. The proposed ADC contains a SAR ADC for the most significant bit (MSB) and a single-slope ADC for the least significant bit (LSB). To solve the issue of exponentially increasing sampling speed based on the resolution of the single-slope ADC, the SAR ADC is designed to be reconfigurable with a resolution of 8–10-bit, while the single-slope ADC is configured with a resolution of 4-bit. To achieve this resolution reconfiguration, the bit shifting method is proposed and implemented with reconfigurable SAR logic circuit and 4-bit single-slope digital ramp generator. Measurement results demonstrate the power consumption of 34.0 uW, which includes analog power of 23.8 uW and digital power of 10.2 uW, INL/DNL of ±3.5 LSB and −1.0/+2.5 LSB. The ENOB and FoM are measured to be 10.8 bits and 53 fJ/step, respectively.
APA, Harvard, Vancouver, ISO, and other styles
23

Ye, Jiajun. "Advancements in Spatial Domain Image Steganography: Techniques, Applications, and Future Outlook." Applied and Computational Engineering 94, no. 1 (2024): 6–19. http://dx.doi.org/10.54254/2755-2721/94/2024melb0058.

Full text
Abstract:
Abstract. Image steganography, a technique for transmitting secret information hidden within images over public networks undetected, serves as a discreet alternative to cryptography in the field of information security. This article explores new steganography techniques based on the Least Significant Bit (LSB) method, widely recognized for its simplicity in embedding secret data by altering the least significant bit of pixels in the spatial domain. The performance of these LSB-based methods is critically assessed using criteria such as Peak Signal-to-Noise Ratio (PSNR), embedding capacity, and histogram analysis. A comprehensive review of recent literature provides a foundation for this evaluation, highlighting advancements and identifying areas for future improvement. Additionally, the article discusses practical applications of LSB-based steganography in healthcare, government operations, and cloud storage, suggesting directions for further research and development in this subtly powerful area of data security.
APA, Harvard, Vancouver, ISO, and other styles
24

Majumder, Jayeeta, and Chittaranjan Pradhan. "An interpolation based steganographic technique with least significant-bit and pixel value differencing in a pixel block." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 1074–82. https://doi.org/10.11591/ijeecs.v27.i2.pp1074-1082.

Full text
Abstract:
Over the past few years, in order to improve the hiding capacity and the peak signal-to-noise ratio (PSNR) value, several steganographic techniques have been developed. Steganography has become a popular technique to transmit secret data through any medium. In image steganography, the human eye cannot easily identify the hidden data which is embedded into the image. Small changes are also not detected by the human eye. High hidden capacity along with high visual quality is provided by the pixel value differencing (PVD) method. This paper first proposes the method of interpolation between the pixel blocks and then applies the least-significant-bit (LSB) substitution technique with the PVD method. At the starting phase, the original image is fixedto a 2x2 block, then the nearest neighbor interpolation (NNI) technique is implemented. In the next phase, the upper left pixel isembedded by the kbit LSB substitution method along with hidden data. The newly generated neighbouring pixel value is measured. Thus, data is hidden from three directions. Through this paper using two different range tables, the new algorithm is proposed. We observed that in both cases, PSNR and the hiding capacity are improved.
APA, Harvard, Vancouver, ISO, and other styles
25

Majumder, Jayeeta, and Chittaranjan Pradhan. "An interpolation based steganographic technique with least-significant-bit and pixel value differencing in a pixel block." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 1074. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp1074-1082.

Full text
Abstract:
Over the <span lang="EN-US">past few years, in order to improve the hiding capacity and the peak signal-to-noise ratio (PSNR) value, several steganographic techniques have been developed. Steganography has become a popular technique to transmit secret data through any medium. In image steganography, the human eye cannot easily identify the hidden data which is embedded into the image. Small changes are also not detected by the human eye. High hidden capacity along with high visual quality is provided by the pixel value differencing (PVD) method. This paper first proposes the method of interpolation between the pixel blocks and then applies the least-significant-bit (LSB) substitution technique with the PVD method. At the starting phase, the original image is fixedto a 2x2 block, then the nearest neighbor interpolation (NNI) technique is implemented. In the next phase, the upper left pixel isembedded by the k-bit LSB substitution method along with hidden data. The newly generated neighbouring pixel value is measured. Thus, data is hidden from three directions. Through this paper using two different range tables, the new algorithm is proposed. We observed that in both cases, PSNR and the hiding capacity are improved.</span>
APA, Harvard, Vancouver, ISO, and other styles
26

Pooja Belagali, Dr. V. R. Udupi. "Robust Image Steganography Based on Hybrid Edge Detection." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 1509–21. http://dx.doi.org/10.52783/tjjpt.v44.i3.531.

Full text
Abstract:
Steganography is a technique for hiding digital messages into other digital media, such as images, audio, video, and others so that the messages can be disguised and not directly visible to the human vision. There are two kinds of steganography by domain, i.e., spatial domain and frequency domain [7]. Least Significant Bit (LSB) is a popular method in spatial domains [8]. LSB is not a new method. However, this method has many advantages, such as simple algorithm and the quality of imperceptibility of relatively good stego-image [6, 9]. This makes the LSB still open for more development and further research. This paper presents the image hiding technique using Least Significant Bit (LSB) steganography based on hybrid edge detection that maximized the data embedding capacity of the cover image. The performance of the system is evaluated for hybrid edge detection using pairs of various edge detection techniques such as Canny, Kirsch, Sobel, and Prewitt. The results of the proposed steganography approach are estimated for different payload capacities based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Metrics (SSIM), and Universal Image Quality Index (UQI). It is examined that the proposed approach performs better than the existing state of arts for image steganography.
APA, Harvard, Vancouver, ISO, and other styles
27

S.Azhagu, Senthil. "IMAGE STEGANOGRAPHY BASED ON LSB MATCHING TECHNIQUE USING SECRET SHARING METHOD." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 4 (2019): 312–15. https://doi.org/10.5281/zenodo.2653584.

Full text
Abstract:
Least significant bit (LSB) method is a well-known steganographic algorithm in the spatial domain. LSB drops the visual quality of the image and leads to poor security. To overcome this issue the least significant bit matching revisited steganography was expanded and developed an edge adaptive image steganography. To provide more security for this scheme, this paper provides a combined scheme with (u, v) secret image sharing algorithm. With the additional facility of steganography with authentication and proposes a new algorithm in this paper, which is more secure compared to the previous scheme. This scheme provides four level of security.1) The message is hidden into an image using two keys rotation key (key 1) and the travelling order (key 2) of the algorithm. 2) The (u, v) – threshold function is applied for a batch of n members to share the secret image. Any u or more of v shares can only reconstruct the image consisting of the message. 3) Then the embedding scheme is used to embed each share into camouflage images. 4) The authentication is also provided by the proposed scheme. Thus the scheme is more appropriate for the application where high security and efficiency are mandatory and it can also handle color images with slight modifications.
APA, Harvard, Vancouver, ISO, and other styles
28

Adhimah, Laily Farkhah, Isti Nurhafiyah, Adnan Aditya Muntahar, Fandi Kristiaji, and Dinar Mustofa. "Implementasi Aplikasi Steganografi Berbasis Web Menggunakan Algoritma LSB dan BPCS." Komputa : Jurnal Ilmiah Komputer dan Informatika 12, no. 2 (2023): 100–108. http://dx.doi.org/10.34010/komputa.v12i2.10319.

Full text
Abstract:
Steganography is a method for concealing sensitive information in seemingly unremarkable data. In recent years, the use of steganography in web applications has become popular due to its accessibility and ability to conceal data in various types of media. Implementing a web-based steganography program that makes use of the Bit-Plane Complexity and Least Significant Bit algorithms is the aim of this project. To enable users to access the application through a browser, the system is constructed utilizing web technologies like HTML, CSS, and JavaScript during the design phase. The LSB and BPCS algorithms are employed as methods to embed secret data into user-selected images. The least significant bit of each image pixel is utilized to hold a secret piece of information using the straightforward steganography technique known as LSB. On the other hand, BPCS is a more complex steganography method that combines spatial and frequency domain analysis to hide data within high-quality images. The findings of this study show that the technique of hiding sensitive information within photos is successfully implemented by the web-based steganography program employing the LSB and BPCS algorithms.
APA, Harvard, Vancouver, ISO, and other styles
29

Alshammari, Kaznah. "Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 8 (2024): 57–65. http://dx.doi.org/10.21833/ijaas.2024.08.007.

Full text
Abstract:
Steganography was originally developed to hide and transmit sensitive information. One major advancement in this field is the ability to hide data within digital images. Significant progress has been made, demonstrating effective methods for concealing data. Various techniques have been used, including statistical steganography, distortion techniques, and the Discrete Cosine Transform (DCT). However, the Least Significant Bit (LSB) method is particularly important and remains the most widely used. Researchers have developed methods based on these principles, such as pseudorandom permutation. This paper introduces the Most Match Parity Bit Approach (MMPB-A), which is based on the LSB method. MMPB-A strategically identifies the parity bits of selected pixels to embed information in cover images. It uses a six-bit encryption for each symbol, allowing ample space to hide information while preserving similarity and secrecy. Additionally, encoding hidden data indices in a three-bit code enhances data concealment and ensures greater confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
30

Ashiq Abdul Khader, Muhammed, Saranya Kavileswarapu, Ritika Sarkar, and Sannasi Ganapathy. "SECURE TEXT IN IMAGE STEGANOGRAPHY USING PIXEL-BASED ALGORITHM." International Journal of Engineering Applied Sciences and Technology 7, no. 1 (2022): 338–42. http://dx.doi.org/10.33564/ijeast.2022.v07i01.052.

Full text
Abstract:
The art of encrypting a hidden message within a public message is known as steganography. Traditionally methods like LSB (least significant bit) modification, the five-modulus method and other algorithms have been utilized to encode a lower quality image into a higher resolution image via steganography. This research aims to implement a novel text in image steganography using pixel-based algorithms where the security of the text is enhanced by integrating encryption before embedding secret messages. We use the Chinese Remainder Algorithm (CRT) to cryptographically secure the secret message inside the image and the least significant bit algorithm to store the message inside the image. A novel method is propounded for the key generation of the CRT algorithm and the results have been studied and compared with the results of the methods in existing studies.
APA, Harvard, Vancouver, ISO, and other styles
31

Paraskevov, Hristo, Aleksandar Stefanov, and Borislav Stoyanov. "YASH: YET ANOTHER STEGO HIDING." Annals of the Academy of Romanian Scientists Series on Mathematics and Its Application 12, no. 1-2 (2020): 238–45. http://dx.doi.org/10.56082/annalsarscimath.2020.1-2.238.

Full text
Abstract:
We present a novel pseudorandom insertion least significant bit (LSB) based hiding scheme using Circle map byte output. The proposed algorithm is analysed by means of computer simulation. We evaluated the designed LSB method with NIST and ENT statistical packages, peak signal-to-noise ratio, and histogram analysis. The results data show good performance of the novel stego hiding
APA, Harvard, Vancouver, ISO, and other styles
32

Chan, Chi-Shiang, and Chin-Chen Chang. "An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy." Fundamenta Informaticae 65, no. 4 (2005): 291–305. https://doi.org/10.3233/fun-2005-65401.

Full text
Abstract:
Simple least-significant-bit (LSB) substitution is the most straightforward way to embed the secret image in the host image. Based on the simple LSB substitution, the method using substitution table is proposed to improve the quality of the stego-image. In this paper, we shall bring up a new method that uses the un-embedded host pixel bits to partition the host pixel into different planes. This way, we can derive the optimal substitution table for each plane. By combining the optimal substitution tables, we can obtain the final result that we call the multi-bit-reference substitution table. After transforming the secret data according multi-bit-reference substitution table, we can embed the transformed secret data in the host image so that the host image will be degraded possibly less. The experimental results show that our method leads to good results.
APA, Harvard, Vancouver, ISO, and other styles
33

Ratama, Niki, and Munawaroh Munawaroh. "Implementasi Metode Kriptografi dengan Menggunakan Algoritma RC4 dan Steganografi Least Significant Bit Dalam Mengamankan Data Berbasis Android." JURNAL MEDIA INFORMATIKA BUDIDARMA 6, no. 2 (2022): 1272. http://dx.doi.org/10.30865/mib.v6i2.3902.

Full text
Abstract:
Security is a protection or protecting something important from something unwanted or other things that are theft of data security techniques, there are several ways to provide protection, one of which is by inserting something data that you want to protect into other media, message security. secret by inserting a message into an image file or better known as steganography is a development of a cryptography, where cryptography itself is a data security technique that contains elements of data management or formulation before it becomes new data and the new data can only be read or opened. by a certain person who can know the pattern of managing the data. The security and confidentiality of a message is very important and must be maintained, the problem of data confidentiality in a company or institution is a major problem where a lot of data that is confidential is open or widespread, this is very detrimental to the company, in addition to data confidentiality The other factor is that data confidentiality is a continued asset for the company to continue to managers in other divisions which must be maintained and used by someone appointed. From these problems, a cryptographic method is needed where the algorithm used is RC4 and steganography is used using Least Significant Bit (LSB) as the method. The advantage of RC4 is that the data in the management of making cryptography is more structured and has a non-static pattern in which the creation of confidential data can be made quickly and safely, while the Least Significant Bit (LSB) method is a method of inserting binary data into an image that has a color image and in it can accommodate 6 bits for the message. The purpose of this research is to create a cryptographic application system that combines the Least Significant Bit (LSB) technique to secure an android-based data
APA, Harvard, Vancouver, ISO, and other styles
34

Mahdi, Sally A., and Maisa’a A. Khodher. "An Improved Method for Combine (LSB and MSB) Based on Color Image RGB." Engineering and Technology Journal 39, no. 1B (2021): 231–42. http://dx.doi.org/10.30684/etj.v39i1b.1574.

Full text
Abstract:
Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least significant bit (LSB) based on a color image (24bit for RGB). The presented study proposes a novel method to combine (LSB and MSB) bits based on check MSB values and replace bits from LSB with a secret message. The result of this proposed method that made not affect quality stego -image based on the resulting histogram that shows a match between the cover image and stego- image and more secure because not hidden in all image. The factors were used Mean Square Error (MSE), Compute Payload, in addition to Peak Signal to Noise Ratio (PSNR). The PSNR’s rate is high and MSE is less. The result of this paper when applying on the different image gives high PSNR of 87.141 and less MSE of 0.00012 when inserting message 80 bits and reduction value PSNR of 72.023 and MSE of 0.0040 when inserting message 1200 bits and measure entropy is the same value for cover image and stego –image then this method is more security for the attacker.
APA, Harvard, Vancouver, ISO, and other styles
35

Badr, Aymen Mudheher, Mohamed layth Talal, and Ghassan Sabeh. "Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 8 (2018): 112–21. http://dx.doi.org/10.29196/jubpas.v26i8.1676.

Full text
Abstract:
Because the big grown of the digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography is the art of embedding, hiding information into different digital media, it was the main reason to increase its importance in the exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper, we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits. Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image’s frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack.
APA, Harvard, Vancouver, ISO, and other styles
36

Madhusudhan, K. N., and P. Sakthivel. "Combining Digital Signature with Local Binary Pattern-Least Significant Bit Steganography Techniques for Securing Medical Images." Journal of Medical Imaging and Health Informatics 10, no. 6 (2020): 1288–93. http://dx.doi.org/10.1166/jmihi.2020.3015.

Full text
Abstract:
The image authentication is generally based on two different types of techniques: watermarking and digital signature. In watermarking methods, embedded watermarking is often imperceptible and it contains either a specific ID of producer or codes related to content that are used for authentication. Normally a separate file is stored, digital signature is a non-repudiation and encrypted version of the information extracted from the data. A digital signature can be attached to the data to prove the originality and integrity. The proposed work presents a new approach to steganography of medical images that uses modified Least Significant Bit (LSB) based on the Local Binary Pattern (LBP) pattern. As a first step, cover image has been divided as blocks of 3×3 non overlapping masks. Then, the pixel embedding position (clock wise or anti-clock wise) has to be identified using LBP operator. The value of the LBP operator determines how and where to embed secret image pixel. Later, using LSB method, pixel values will be embedded in the cover image pixel. In order to provide the integrity of the data, the proposed work also presents Reversible Watermarking (RW), a Digital Signature (DS) technique. The proposed algorithm of steganography experimented on few medical images and achieved better efficiency with respect to MSE and PSNR values and same is reported in this paper.
APA, Harvard, Vancouver, ISO, and other styles
37

Barrios, Gabriel Nicoh, Youzelle Migo Gundayao, Francis Emanuel Santoyo, et al. "Modified Least Significant Bit Algorithm Applied in Digital Image Signature." International Journal of Computing Sciences Research 8 (January 1, 2024): 3010–26. https://doi.org/10.25147/ijcsr.2017.001.1.200.

Full text
Abstract:
Purpose–This study aims to improve the embedding process and the integration of an additional layer of security to enhance the overall security of the based Least Significant Bit Algorithm. Method–The study incorporated the use of NTRUEncryptfor the encryption of the plaintext message, and a randomized embedding technique by generating random pixel locations based on the Lorenz Chaos System.This wasassessed using histogramanalysis to showthedifference between the original and the stego-image, MeanSquaredError(MSE), and Peak signal-to-noise ratio(PSNR). Results–The modification has been evaluated using a histogram along with the result of its PSNR and MSE, at which the modified least significant bit algorithm obtains the highest PSNR score of 77.078%and the lowest MSE score of 0.0012%forthe 512x512 image size,which resulted in a less distorted image and better quality of the image compared to the original base LSB. Conclusion–The modification of the least significant bit algorithm successfully implemented a randomized embedding process through the Lorenz System and encrypted the secret message through NTRUEncrypt before embedding to further secure the message inside the image. Image distortion was also lessened as tested from the different sizes of images, which were testedthrough the PSNR and MSE metrics. Recommendations–The study suggests the implication of machine learning algorithms in generating key pixel locations for data embedding and the use of text compression algorithms to reduce the size of the embeddedsecret message. Research Implications–This study is a significant resource for future researchersinterested in exploring literature on image steganography and secure communication.Thus, it introduces a novel approach by integrating lattice-based encryption and chaos systems, thereby enhancing secure communication through digital image steganography. Keywords–digital image signature,image steganography, least significant bit, Lorenz system, NTRUEncrypt
APA, Harvard, Vancouver, ISO, and other styles
38

Jalid, Alfian Abdul, Agus Harjoko, and Anny Kartika Sari. "Steganographic Model for encrypted messages based on DNA Encoding." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 1 (2021): 43. http://dx.doi.org/10.22146/ijccs.61767.

Full text
Abstract:
Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more security to ensure its confidentiality. One way of securing information is by hiding the information in certain media using steganography techniques. Steganography is a method of hiding information into other files to make it invisible. One of the most frequently used steganographic methods is Least Significant Bit (LSB).In this study, the LSB method will be modified using DNA Encoding and Chargaff's Rule. Chargaff's Rule or complementary base pairing rule is used to construct a complementary strand. The modification of the LSB method using DNA encoding and Chargaff's Rule is expected to increase the security of the information.The MSE test results show the average value of the LSB method is 0.000236368, while the average value for the DNA Encoding-based Steganography method is 0.000770917. The average PSNR value for the LSB method was 76.82 dB while the DNA Encoding-based Steganography method had an average value of 70.88 dB. The time of inserting and extracting messages using the Steganography method based on DNA Encoding is relatively longer than the LSB method because of its higher algorithmic complexity. The message security of the DNA Encoding-based Steganography method is better because there is encryption in the algorithm compared to the LSB method which does not have encryption.
APA, Harvard, Vancouver, ISO, and other styles
39

Hiswara, Abrar, Aida Fitriyani, and Reza Adi Nugraha. "SISTEM STEGANOGRAPHY DENGAN METODE LEAST SIGNIFCANT BIT (LSB) & METODE CAESAR CIPHER BERBASIS ANDROID." Jurnal Informatika 20, no. 1 (2020): 78–88. http://dx.doi.org/10.30873/ji.v20i1.1615.

Full text
Abstract:
This research aims at information security in the form of document files, documents are casual but have a vital role, due to many cyber crimes that try or commit data theft, illegal access or misuse of documents that are used as a particular crime tool. the software development method uses the Rapid Application Development (RAD) model, while the research method applies the Least Significant Bit (LSB) method of hiding information into a digital media (image) as a steganographic technique and Caesar Cipher as a cryptographic technique that encrypts * document filename into aform Caesar randomly characters. The results of the study resulted in an android-based steganography system that uses the Java programming language, as data security for document systems using the least significant bit and caesar cipher method as a top priority and making the system more friendly and interactive to be used easily by users. Steganography system is considered to provide an alternative for users as a system that is able to maintain the confidentiality of documents and provide information to users of the importance of a data security measure.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Jiaqi, Dongpo Zhang, and Shang Zhang. "A Digital Image Steganographic Detection Method for LSB Steganography." International Journal of Computer Science and Information Technology 4, no. 2 (2024): 256–63. http://dx.doi.org/10.62051/ijcsit.v4n2.33.

Full text
Abstract:
With the advancement of communication technology, communication information can no longer be transmitted merely through text but can be covertly conveyed via various types of communication carriers like images, audio, and video. This brings forth new challenges to traditional detection techniques that mainly target text information. Digital image steganalysis aims to detect and uncover communication information by recognizing steganographic behaviors contained within digital image files. This paper takes digital image steganographic activities based on least significant bit (LSB) as the main research object and conducts analysis and identification of digital images with steganographic information through visual attack method. It has been verified through experiments that steganographic activities based on LSB are hardly detectable through direct visual observation, but can be identified visually after undergoing visual attack processing.
APA, Harvard, Vancouver, ISO, and other styles
41

Gao, Feng, and Fang Fang Yang. "Analysis on the Impact of the Data Acquisition Board on the Performance Indicators of the Virtual Multi-Channel Pulse Height Analyzer." Applied Mechanics and Materials 519-520 (February 2014): 1209–13. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1209.

Full text
Abstract:
The DAB (Data Acquisition Board) is a key component of the VMPHA (Virtual Multi-channel Pulse Height Analyzer). In order to assist the design of the VMPHA, the influence of the DAB on the performances of the VMPHA has been studied through the method of theoretical analysis in this paper. The Sampling Rate, the LSB (Least Significant Bit) and the Data Transfer Rate of the DAB have decisive effects on the performance of the VMPHA. The Sampling Rate and the LSB are the two main factors that determine the energy resolution which is one of the most important performance indicators for the VMPHA. Another most important performance indicator for the VMPHA, the number of channels, is determined by the LSB alone. Moreover, the relationship among the three key performance parameters of the DAB is mutual influence. At the end of the paper, the selection method of the DAB for developing a VMPHA is summarized and presented.
APA, Harvard, Vancouver, ISO, and other styles
42

Mohsin, Nadia A., and Huda A. Alameen. "A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection." Cybernetics and Information Technologies 21, no. 3 (2021): 97–107. http://dx.doi.org/10.2478/cait-2021-0032.

Full text
Abstract:
Abstract In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.
APA, Harvard, Vancouver, ISO, and other styles
43

Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.10792.

Full text
Abstract:
<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.pp2735-2741.

Full text
Abstract:
<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>
APA, Harvard, Vancouver, ISO, and other styles
45

Tütüncü, Kemal, and Özcan Çataltaş. "Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach." Computer Science and Information Systems, no. 00 (2021): 48. http://dx.doi.org/10.2298/csis210227048t.

Full text
Abstract:
This study proposes a new hybrid n-LSB (Least Significant Bit) substitution-based image steganography method in the spatial plane. The previously proposed n-LSB substitution method by authors of this paper is combined with the Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) encryption algorithms to improve the security of the steganography, which is one of the requirements of steganography, and the Lempel-Ziv-Welch (LZW), Arithmetic and Deflate lossless compression algorithms to increase the secret message capacity. Also, embedding was done randomly using a logistic map-based chaos generator to increase the security more. The classical n-LSB substitution method and the proposed hybrid approaches based on the previously proposed n-LSB were implemented using different secret messages and cover images. When the results were examined, it has been seen that the proposed hybrid n-LSB approach showed improvement in all three criteria of steganography. The proposed hybrid approach that consists of previously proposed n-LSB, RSA, Deflate, and the logistic map had the best results regarding capacity, security, and imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
46

Zalata, Mohamad K. Abu, Mohamad T. Barakat, and Ziad A. Alqadi. "Carrier Image Rearrangement to Enhance the Security Level of LSB Method of Data Steganography." International Journal of Computer Science and Mobile Computing 11, no. 1 (2022): 182–93. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.024.

Full text
Abstract:
Least significant bit method is one of the most popular methods of data steganography, this method is very simple and provides good values for MSE and PSNR. LSB method is not secure enough and the embedded secret message can be easily hacked by any person with any programming experience. To enhance the security level of LSB and to protect the secret message from being hacked and addition stage is recommended. This stage adds a necessary protection without affecting the quality parameters and the efficiency of LSB. The protection process is based on using a complex private key, this key is generated by sender depending on the block size and the selected image size and kept in secret to be used by the receiver, the private key can be changed or updated any time, when the needs arise.
APA, Harvard, Vancouver, ISO, and other styles
47

D.Rathna, Kishore, D.Suneetha, Babu P.Narendra, and P.Chinababu. "Deep Convolutional Neural Network based Image Steganogrpahy Technique for Audio-Image Hiding Algorithm." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2187–89. https://doi.org/10.35940/ijeat.D7843.049420.

Full text
Abstract:
Steganography is one expanding filed in the area of Data Security. Steganography has attractive number of application from a vast number of researchers. The most existing technique in steganogarphy is Least Significant Bit (LSB) encoding. Now a day there has been so many new approaches employing with different techniques like deep learning. Those techniques are used to address the problems of steganography. Now a day’s many of the exisiting algorithms are based on the image to data, image to image steganography. In this paper we hide secret audio into the digital image with the help of deep learning techniques. We use a joint deep neural network concept it consist of two sub models. The first model is responsible for hiding digital audio into a digital image. The second model is responsible for returning a digital audio from the stego image. Various vast experiments are conducted with a set of 24K images and also for various sizes of images. From the experiments it can be seen proposed method is performing more effective than the existing methods. The proposed method also concentrates the integrity of the digital image and audio files.
APA, Harvard, Vancouver, ISO, and other styles
48

Rajput, Prof Vaishali, Soham Ambar, Yash Ambodekar, et al. "F.Y.B.Tech Students’ Engineering Design and Innovation (EDAI 2) Project Paper, SEM 2 A.Y. 2023-24 Vishwakarma Institute of Technology, Pune, INDIA." International Journal of Advances in Engineering and Management 6, no. 11 (2024): 512–16. https://doi.org/10.35629/5252-0611512516.

Full text
Abstract:
: In the digital age, the need for secure communication has become paramount, leading to the development of various techniques for data protection and privacy. Image steganography, the practice of concealing information within digital images, has emerged as a crucial method for covert communication. This paper delves into the application of the Least Significant Bit (LSB) insertion technique for image steganography. LSB insertion is a straightforward yet powerful approach that involves modifying the least significant bits of pixel values in an image to embed secret data. This method leverages the human eye's insensitivity to minor changes in color values, ensuring that the alterations remain imperceptible to observers. We begin by exploring the theoretical underpinnings of LSB insertion, including the principles of digital image representation and the rationale behind the selection of least significant bits for data embedding. Following this, we present a detailed implementation framework for LSB insertion, Outlining the Algorithmic steps involved in both embedding and extraction processes. The paper evaluates the effectiveness of LSB insertion in concealing data without compromising the visual quality of the carrier image. Moreover, we address potential vulnerabilities inherent in LSB-based steganography, such as Challenge of ensuring robustness against common image manipulations like compression and cropping. To mitigate these vulnerabilities, we propose enhancements and countermeasures, including the use of cryptographic techniques and adaptive LSB insertion methods. Through extensive experimental results, we demonstrate the capacity of LSB insertion to securely embed and retrieve information, emphasizing its practicality and efficiency for realworld applications. The findings indicate that LSB insertion can be effectively used for secure communication, provided that certain precautions are taken to enhance its robustness. This research contributes to the field of secure communication by presenting a comprehensive analysis of LSB insertion and its potential for enhancing data privacy in digital communications.
APA, Harvard, Vancouver, ISO, and other styles
49

Tayh Albderi, Ali Jaber, Dhiah Al-Shammary, and Lamjed Ben Said. "Jaccard-based Random Distribution with Least and Most Significant Bit Hiding Methods for Highly Patients MRI Protected Privacy." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 1032. http://dx.doi.org/10.30630/joiv.7.3-2.2385.

Full text
Abstract:
In this study, the main goal is to improve patient care by making it easier for patient data and pictures to be sent between medical centers without problems. Still, one of the biggest problems with telemedicine is keeping patient information private and ensuring data is safe. This is especially important because even small changes to patient information could have serious consequences, such as wrong evaluations and lower-quality care. This study develops a new model that uses the unique Jaccard distribution of the least significant bit (LSB) and the most significant bit (MSB) to solve this complex problem. The goal of this model is to hide much information about a patient in the background of an MRI cover picture. The careful creation of this model is a crucial part of the current study, as it will ensure a solid way to hide information securely. A more advanced method is also suggested, which involves randomly putting private text in different places on the cover picture. This plan is meant to strengthen security steps and keep private patient information secret. The peak signal-to-noise ratio (PSNR), the structural similarity index measure (SSIM), and the mean square error (MSE) all improved significantly when this method was tested in the real world. With these convincing results, the study shows telemedicine is more effective than traditional methods for keeping patient data safe. This proves that the model and method shown have the potential to greatly improve patient privacy and data accuracy in telemedicine systems, which would improve the general quality of health care.
APA, Harvard, Vancouver, ISO, and other styles
50

Barakat, Mohamad Tariq, Rushdi Abu Zneit, and Ziad A. Alqadi. "Crypto-Steganographic Method to Protect Secret Messages." International Journal of Computer Science and Mobile Computing 10, no. 12 (2021): 46–61. http://dx.doi.org/10.47760/ijcsmc.2021.v10i12.007.

Full text
Abstract:
Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography