scispace - formally typeset
Journal ArticleDOI

Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm

TLDR
In this paper, the secret information is hidden in the Least Significant Bit (LSB) of the different components of the color image in such a way that the original quality of the image to be minimized.
About
This article is published in Materials Today: Proceedings.The article was published on 2021-05-26. It has received 4 citations till now. The article focuses on the topics: Steganography & Cryptography.

read more

Citations
More filters
Book ChapterDOI

An Approach on Image Steganography Based on the Least Significant Bit Algorithm

TL;DR: A standard steganography algorithm has three essential components: carrier, message, and key as discussed by the authors , the carrier is the file that carries the message and an optional key to add a layer of authentication.
Proceedings ArticleDOI

A Combination of RSA Algorithm with Image Steganography to Ensure Enhanced Encryption

TL;DR: In this article , a combination of both cryptography and steganography techniques is used to achieve high security level and good performance in the image steganization process, where the image is in the form of dimensions and the dimensions are converted into pixels and according to the pixels the encrypted text will be embedded into the image.
Proceedings ArticleDOI

A Combination of RSA Algorithm with Image Steganography to Ensure Enhanced Encryption

TL;DR: In this paper , a combination of both cryptography and steganography techniques is used to achieve high security level and good performance in the image steganization process, where the image is in the form of dimensions and the dimensions are converted into pixels and according to the pixels the encrypted text will be embedded into the image.
Book ChapterDOI

An AES-Based Efficient and Valid QR Code for Message Sharing Framework for Steganography

TL;DR: In this article , the authors investigated the use of QR codes for message exchange in steganography, as well as the AES approach, and the end findings' performance will be assessed by comparing image file quality before or after data has been hidden from view in these files.
References
More filters
Proceedings ArticleDOI

A Report on the Impact of Information Technology and Social Media on Covid–19

TL;DR: The role of Information Technology (IT) in the development of various effective algorithms for the diagnosis and prevention of the disease is discussed in this paper, which also covers the responsibilities of various social media along with their vulnerable efforts in carrying awareness to society.
Journal ArticleDOI

A New Approach for Information Security using an Improved Steganography Technique

TL;DR: An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB’s (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas to provide two-tier security.
Journal Article

An Analysis of Map Matching Algorithm for Recent Intelligent Transport System

TL;DR: The main objectives of this paper are to uncover the constraints and limitations by an in-depth literature review and to recommend ideas to address them, including some ideas for monitoring the integrity of map matching algorithms.
Proceedings ArticleDOI

E-mail-Based Covert Channels for Asynchronous Message Steganography

TL;DR: This work presents a simple but effective steganographic schema that can be used to deploy robust secret communication through e-mail that is able to bypass the most sophisticated firewalls and traffic analyzers and causes any perceivable performance degradation or data loss to the end-users.
Proceedings Article

Steganography : random LSB insertion using discrete logarithm

TL;DR: The Secure Information Hiding System (SIHS) is proposed that is based on Least Significant Bit (LSB) technique in hiding messages in an image and enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original message.
Related Papers (5)