A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2023, Vol 11, Issue 5
Abstract
The proposed work introduces an image steganography technique using text-based password that acts as the symmetric key of encryption and decryption. It contains two components, an encoder, and a decoder. An encoder takes a secret image that needs to be hidden inside another cover image. The Combined image is encrypted with an eight characters’ password. The starting position of the cover image from where the secret image starts to hide depends on the password. Then the (Least Significant Bit) LSB Substitution technique is used to hide the entire secret image inside the cover image. The decoder takes the encrypted image and the password to retrieve the secret image back. The proposed work produces an encrypted image by keeping 99% information of the cover image and 100% information of the secret image, thus it provides lossless retrieval of the secret image. The proposed work includes dynamicity of position in steganography that ensures more security of image data over the network than the existing state of art methods.
Authors and Affiliations
Unmesh Mandal, Diotima Nag, Goutam Das, Rimpi Saha
A Review on Drinking Water Treatment with Disinfectant
The majority of the world's natural water sources are not always safe to consume untreated. Raw water from rivers, lakes, ponds, and groundwater can include microorganisms. Waterborne diseases can be contracted by consum...
Elevated Water Tank Design Comparison in Different Seismic Zones
Water is maintained in tall tanks as part of the public water system. Because of a shortage of water or difficulties putting out a fire after an earthquake, the collapse of these water tanks could pose major risks to peo...
Analysis of Bituminous Concrete Mixes Using H.D.P.E & Crumb Rubber as Admixtures
Flexible pavements need more attention in selection of Resources and preparation of mixes now a day’s temperature is the main criteria which affect the mix quality, strength and durability. Rapid changes in temperature n...
Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol
There is need to secure mobile phones locations by privacy frame work which utilizes K optimal principles. This improves the location position and tracking ability of Cell phones. Most of the time quality of service cann...
Using Wireless Sensor and Laser Technique to increase Production
IoT, or the Internet of Things, refers to the network of physical objects, devices, vehicles, buildings, and other items that are embedded with sensors, software, and other technologies to collect and exchange data over...