An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud

被引:0
|
作者
Alam, Md. Khorshed [1 ]
Nushrat, Samia [1 ]
Patwary, Md. Amir Hamza [1 ]
Ullah, Ahsan [1 ]
Robin, Kazi Hassan [1 ]
机构
[1] World Univ Bangladesh, Dept Comp Sci & Engn, Dhaka 1230, Bangladesh
关键词
Steganography; LSB; Cloud computing; TLEA; MLEA;
D O I
10.1007/978-3-031-28180-8_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing allows for a simple, distributed pool of reconfigurable computers with widespread network connectivity. But maintaining data security and privacy is very difficult. In order to guarantee the privacy and security of data in cloud computing, this study developed an efficient and enhanced method that involves concealing data inside pictures. The authors have proposed Multi Level Encryption Algorithm (MLEA) and Two-Level EncryptionAlgorithm (TLEA) and also processed the image in various steps to achieve better security. The objective is to design and develop an image steganography method based on the Least Significant Bit (LSB) technique that can secure the data during sharing or storing. The authors used the LSB technique of image steganography and encrypted data using MLEA and TLEA. The authors compared different methods and proved their research provides better security than the existing ones. This research demonstrates that the proposed method has performance with an average of 19.7814% better than other existing schemes.
引用
收藏
页码:215 / 233
页数:19
相关论文
共 50 条
  • [21] An Improved Image Steganography Technique based on MSB using Bit Differencing
    Ul Islam, Ammad
    Khalid, Faiza
    Shah, Mohsin
    Khan, Zakir
    Mahmood, Toqeer
    Khan, Adnan
    Ali, Usman
    Naeem, Muhammad
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 265 - 269
  • [22] Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer
    S. Jaya Prakash
    K. Mahalakshmi
    The Visual Computer, 2022, 38 : 4129 - 4150
  • [23] Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer
    Prakash, S. Jaya
    Mahalakshmi, K.
    VISUAL COMPUTER, 2022, 38 (12): : 4129 - 4150
  • [24] An improved Image Least Significant Bit Replacement Method
    Darabkh, Khalid A.
    Jafar, Iyad F.
    Al-Zubi, Raed T.
    Hawa, Mohammed
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1182 - 1186
  • [25] Least significant bit-steganography detection using least significant bit plane smoothness
    Munirajan, VK
    Cole, E
    Ring, S
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 666 - 671
  • [26] Undetectable least significant bit replacement steganography
    Shreelekshmi, R.
    Wilscy, M.
    Madhavan, C. E. Veni
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10565 - 10582
  • [27] Undetectable least significant bit replacement steganography
    R. Shreelekshmi
    M. Wilscy
    C. E. Veni Madhavan
    Multimedia Tools and Applications, 2019, 78 : 10565 - 10582
  • [28] Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique
    Alarood, Alaa Abdulsalm
    Alghamdi, Ahmed Mohammed
    Alzahrani, Ahmed Omar
    Alzahrani, Abdulrahman
    Alsolami, Eesa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (07): : 427 - 442
  • [29] Image complexity and feature mining for steganalysis of least significant bit matching steganography
    Liu, Qingzhong
    Sung, Andrew H.
    Ribeiro, Bernardete
    Wei, Mingzhen
    Chen, Zhongxue
    Xu, Jianyun
    INFORMATION SCIENCES, 2008, 178 (01) : 21 - 36
  • [30] An approach of detecting least significant bit matching based on image content
    Xiong, Gang
    Ping, Xi-Jian
    Zhang, Tao
    Sun, Bing
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (06): : 1380 - 1387