LSB replacement stegnography in an image using pseudorandomised key generation

被引:0
|
作者
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Thamotharan, B. [1 ]
Gomathymeenakshi, M. [1 ]
Sruti, S. [1 ]
机构
[1] School of Computing, SASTRA University, Thanjavur, Tamilnadu, India
关键词
Personal computing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the development in technology, data transfer of secret information plays a major role. We go for data security in order to prevent the data from hackers and malware infection. In this study, we dealt with the secret key stegnography method of hiding a plaintext in an image using a random key. The method adopted is highly secured and there is no explicit change in the original image even if long plaintext is inserted in the image. © Maxwell Scientific Organization, 2012.
引用
收藏
页码:491 / 494
相关论文
共 50 条
  • [1] LSB Based Image Steganography Using Dynamic Key Cryptography
    Patel, Nikhil
    Meena, Shweta
    2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMMUNICATION TECHNOLOGIES (ETCT), 2016,
  • [2] An improved steganographic technique using LSB replacement on a scanned path image
    Karthikeyan, B.
    Ramakrishnan, S.
    Vaithiyanathan, V.
    Sruti, S.
    Gomathymeenakshi, M.
    International Journal of Network Security, 2014, 16 (01) : 14 - 18
  • [3] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    Multimedia Tools and Applications, 2017, 76 : 8597 - 8626
  • [4] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [5] Parameterizable LSB watermarking method with adaptive key generation
    Bavrina, Alina
    Myasnikov, Vladislav
    Yuzkiv, Ruslan
    2020 VI INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND NANOTECHNOLOGY (IEEE ITNT-2020), 2020,
  • [6] IMAGE STEGANOGRAPHY IN HIGH ENTROPY REGIONS USING A KEY & MODIFIED LSB FOR IMPROVED SECURITY
    Kumar, Sreekutty S.
    Sylish, S., V
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 1104 - 1108
  • [7] MULTIPLE EMBEDDING SECRET KEY IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM
    Das, Pallavi
    Kushwaha, Satish Chandra
    Chakraborty, Madhuparna
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 845 - 849
  • [8] Cover image preprocessing for more reliable LSB replacement steganography
    Shreelekshmi, R.
    Wilscy, M.
    Madhavan, C. E. Veni
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 153 - 156
  • [9] Stego key searching for LSB steganography on JPEG decompressed image
    Jiufen LIU
    Yuguo TIAN
    Tao HAN
    Junchao WANG
    Xiangyang LUO
    ScienceChina(InformationSciences), 2016, 59 (03) : 60 - 74
  • [10] Stego key searching for LSB steganography on JPEG decompressed image
    Liu, Jiufen
    Tian, Yuguo
    Han, Tao
    Wang, Junchao
    Lu, Xiangyang
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (03)