Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2019, Vol 3, Issue 5
Abstract
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
Statistical Optimization of Synthetic Soda Ash for Water Softening
Synthesized soda ash was prepared by Solvay process with different molar ratio for application of water softening process. In urban utilization, water supply is very important for safe condition. In this research, Box Be...
Justly Balanced Community: Concept, Principles and Aims
All the teachings which Islam gives and instructs are in full conformity with the human nature. They are applicable in all situations and circumstances. There is no excesses or deficiencies found in them. One who acts ac...
Experimental Study on Properties of Some Lesser Used Seasoned Timber Species in Myanmar
This study investigates the properties of four lesser used seasoned timber species in Myanmar: Inn (Dipterocarpus tuberculatus Roxb.), Kanyin (Dipterocarpus turbinatus), Thit-Sein (Terminalia bellirica Roxb.) and Yamane...
Monetary Policy and Trade Balance in Nigeria
Nigeria apex bank Central Bank of Nigeria CBN has continued to battle with the job of reviving the ailing economy and putting it on the path of growth. The economy has witnessed unprecedented job loss, rising poverty lev...
An Analytical Survey on Data Access Control Mechanism in Cloud using Blockchain
Cloud storage is known for its huge infrastructure, this property of the cloud inevitably invites attackers. However, to overcome this data stored in encrypted form, this security measure is not enough to handle the issu...