LSB replacement stegnography in an image using pseudorandomised key generation

被引:0
|
作者
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Thamotharan, B. [1 ]
Gomathymeenakshi, M. [1 ]
Sruti, S. [1 ]
机构
[1] School of Computing, SASTRA University, Thanjavur, Tamilnadu, India
关键词
Personal computing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the development in technology, data transfer of secret information plays a major role. We go for data security in order to prevent the data from hackers and malware infection. In this study, we dealt with the secret key stegnography method of hiding a plaintext in an image using a random key. The method adopted is highly secured and there is no explicit change in the original image even if long plaintext is inserted in the image. © Maxwell Scientific Organization, 2012.
引用
收藏
页码:491 / 494
相关论文
共 50 条
  • [41] Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
    Saqer, Wesam
    Barhoom, Tawfiq
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (03) : 1013 - 1017
  • [42] LSB TECHNIQUE FOR IMAGE AND TEXT HIDING USING THE RED AND GREEN CHANNELS
    Nusir, Sawsan M.
    Al Quran, Lina N.
    Omari, Asmaa H.
    Manasrah, Ahmad M.
    Abu Ata, Belal M.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2018, 13 (11) : 3473 - 3488
  • [43] A LSB substitution oriented image hiding strategy using genetic algorithms
    Wu, MN
    Lin, MH
    Chang, CC
    CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 219 - 229
  • [44] An Enhanced Image Encryption Technique using DES Algorithm with Random Image overlapping and Random key Generation
    Shivhare, Ritesh
    Shrivastava, Ritu
    Gupta, Chetan
    2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT), 2018,
  • [45] Minimal Block Knight’s Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography
    Shashikiran B.S.
    Shaila K.
    Venugopal K.R.
    SN Computer Science, 2021, 2 (3)
  • [46] RGB Image Steganography on Multiple Frame Video using LSB Technique
    Kumar, Saket
    Yadav, Ajay Kumar
    Gupta, Ashutosh
    Kumar, Pradeep
    2015 INTERNATIONAL CONFERENCE ON COMPUTER AND COMPUTATIONAL SCIENCES (ICCCS), 2015, : 226 - 231
  • [47] Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique
    SenthilKumaran, N.
    Abinaya, S.
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 448 - 451
  • [48] Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB
    Inan, Yucel
    THIRD INTERNATIONAL CONFERENCE ON COMPUTATIONAL MATHEMATICS AND ENGINEERING SCIENCES (CMES2018), 2018, 22
  • [49] LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map
    Pichardo-Mendez, J. L.
    Palacios-Luengas, L.
    Martinez-Gonzalez, R. F.
    Jimenez-Ramirez, O.
    Vazquez-Medina, R.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3055 - 3074
  • [50] Reversible Image Steganography Using Dual-Layer LSB Matching
    Sahu, Aditya Kumar
    Swain, Gandharba
    SENSING AND IMAGING, 2019, 21 (01):