scispace - formally typeset
Proceedings ArticleDOI

Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard

Reads0
Chats0
TLDR
In this paper, the Least Significant Bit (LSB) method of steganography and AES encryption was used to increase the security of the transmission while also providing confidentiality, and the receiver will receive the encoded image and the key with why the encrypted method can be decrypted.
Abstract
Steganography is the method of hiding messages or data (plain text) by encoding them into some other data (usually images). Through this mechanism, the secured plain text message can be completely concealed from unauthorized access. Using steganography, we can hide messages by encoding it in an image and then send it to the receiving user. In our proposed method using steganography and encryption, we have implemented a mechanism to transmit a message from the sender to the receiver and increase the security of the transmission while also providing confidentiality. The receiver will receive both the encoded image and the key with why the encrypted method can be decrypted. We will be using the Least Significant Bit (LSB) method of steganography and AES encryption to achieve this.

read more

Citations
More filters
Journal ArticleDOI

The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images

TL;DR: In this paper , the authors used the Improved AES-128 (Advanced Encryption Standard) Algorithm to encrypt messages and LSB (Least Significant Bit) algorithm to insert ciphertext into an image.
Journal ArticleDOI

The Application of the Blowfish Algorithm and the Least Significant Bit Method for Securing Student Transcripts

TL;DR: This study seeks to prevent transcripts from being modified or falsified by locking data into student photos using blowfish and least significant bit algorithms, and can conclude that the application of blow fish and leastificant bit algorithms to secure data and enter data intoStudent photos is extremely effective in transkrip value.
Proceedings ArticleDOI

Image Data Security in Cloud by using Steganography

D. Lavanya, +1 more
TL;DR: In this paper , the authors discuss about steganography fundamentals as well applications and techniques of steganographic techniques and apply them in the cloud computing environment and discuss about the application and techniques.
Book ChapterDOI

Secured Messaging Using Image and Video Steganography

TL;DR: In this paper , the authors proposed a secure way for transmitting messages using algorithms like least significant bits, K-least significant bits and key-frame selection for image and video steganography.
References
More filters
Journal ArticleDOI

Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research

TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI

Proposed System for Data Hiding Using Cryptography and Steganography

TL;DR: In this paper, the authors have developed a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module, in which AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of message is used to generate two secret keys which make this system highly secured.
Proceedings ArticleDOI

Image steganography using AES encryption and least significant nibble

TL;DR: A steganography technique in which text is concealed in an image so as to contain each nibble of the input text in order to maximise on data capacity and also ensure security.
Proceedings ArticleDOI

High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition

TL;DR: A novel technique to embed secret information in cover image based on discrete wavelet transform (DWT) and singular value decomposition (SVD) and shows robustness against various image processing and geometric attacks.
Proceedings ArticleDOI

Secured Data Hiding and Sharing using Improved LSB-based Image Steganography Technique

TL;DR: The PSNR and SSIM results showed that after a 100 percent embedding to the LSBs of the cover image, distortions were within the satisfactory range and the Chi-square and RS analysis simulation results proved that the stego-images generated by the proposed technique have a low probability of detection.