Message Segmentation to Enhance the Security of LSB Image Steganography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 3
Abstract
Classic Least Significant Bit (LSB) steganography technique is the most used technique to hide secret information in the least significant bit of the pixels in the stego-image. This paper proposed a technique by splitting the secret message into set of segments, that have same length (number of characters), and find the best LSBs of pixels in the stego-image that are matched to each segment. The main goal of this technique is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed technique gives good enhancement to the Classic Least Significant Bit (LSB) technique
Authors and Affiliations
Dr. Mohammed Abbas Fadhil Al-Husainy
A new approach of designing Multi-Agent Systems
Agent technology is a software paradigm that permits to implement large and complex distributed applications [1]. In order to assist analyzing, conception and development or implementation phases of multi-agent systems,...
Pattern Recognition Approach in Multidimensional Databases: Application to the Global Terrorism Database
This paper presents a pattern recognition approach in multidimensional databases. The approach is based on a clustering method using the distance measurement between a reference profile and the database observations. Two...
ReCSDN: Resilient Controller for Software Defined Networks
Software Defined Networking (SDN) is an emerging network paradigm that provides central control over the network. Although, this simplifies the network management and makes efficient use of network resources, it introduc...
Detection of Malware and Malicious Executables Using E-Birch Algorithm
Malware detection is one of the challenges to the modern computing world. Web mining is the subset of data mining used to provide solutions for complex problems. Web intelligence is the new hope for the field of computer...
Optimization and Deployment of Femtocell: Operator’s Perspectives
This study examines the deployment issues of Femtocell, which require the satisfaction level of users on available bandwidth. Femtocells are small Base Stations installed in Homes for the improvement of coverage and capa...