Hiding Data using LSB in Combination with AES

被引:0
|
作者
Sultan, Nora H. [1 ]
机构
[1] Kufa Univ, Coll Educ Girls, Dept Comp Sci, Kufa, Iraq
关键词
Cryptography; Steganography; Peak Signal to Noise Ratio (PSNR); Mean Square Error (MSE); Advanced Encryption Standard (AES); Least Significant Bit (LSB);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
-In our increasingly digital age, steganography has emerged as one of the most trustworthy methods for the transmission of confidential information. This new research improves upon earlier LSB approaches by demonstrating how they may be utilized to efficiently encode secret data into a covert object without causing any obvious distortion. This opens the door for future applications of these methods. A safe data -hiding model will be produced by combining LSB-based steganography with AES; an LSB-based AES-256 encryption has been created and implemented in MATLAB. First, encrypted picture data is produced by encrypting the original image using a 256 -bit AES technique. This process takes place before the image is used. The subsequent step includes sending a LSB-based steganography picture to the objective, which additionally contains the scrambled information. Interpreting the steganography picture information and reestablishing the first picture have both been achieved through the work of a similar strategy at the less than desirable finish of the transmission. We have examined and assessed an expansive range of sources of info and results from a few emphasess of the procedure applied to an assortment of picture information types. It is feasible to involve it in numerous useful cryptography applications to go through with steganography picture exchanges in a safer way.
引用
收藏
页码:2420 / 2425
页数:6
相关论文
共 50 条
  • [1] Data Hiding in Video Using Adaptive LSB
    Liao, Yi-Chun
    Chen, Chung-Han
    Shih, Timothy K.
    Tang, Nick C.
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 185 - 189
  • [2] Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
    Hosam, Osama
    Ahmad, Muhammad Hammad
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 153 - 161
  • [3] Data Hiding Using Shuffle Algorithm and LSB Method
    Akbay, Kemal
    Konyar, Mehmet Zeki
    Ilkin, Sumeyya
    Sondas, Adnan
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [4] On Using LSB Matching Function for Data Hiding in Pixels
    Chan, Chi-Shiang
    FUNDAMENTA INFORMATICAE, 2009, 96 (1-2) : 49 - 59
  • [5] The Application Of LSB Steganography For Secure Text and Hiding Confidential Information Using AES Cryptography
    Ahyuna, Ahyuna
    Syamsuddin, Sadly
    Hasriani, Hasriani
    Ardimansyah, Ardimansyah
    Irmawati, Irmawati
    Wahyuni, Sri
    3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 356 - 362
  • [6] DATA HIDING TECHNIQUE BY USING RGB-LSB MECHANISM
    Agham, Vinit
    Pattewar, Tareek
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [7] Survey on LSB Data Hiding Techniques
    Jois, Aakaash
    Tejaswini, L.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 656 - 660
  • [8] An LSB data hiding technique using natural number decomposition
    Dey, Sandipan
    AbrahaM, Ajith
    Sanyal, Sugata
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 473 - +
  • [9] An LSB based novel data hiding method using extended LBP
    Das, Sujit Kumar
    Dhara, Bibhas Chandra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (12) : 15321 - 15351
  • [10] Information Hiding using LSB technique
    Ahmed, Jassim Mohmmed
    Ali, Zulkarnain Md
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 18 - 25