Proceedings ArticleDOI
The Performance of Cover Image Steganography for Hidden Information within Image File using Least Significant bit algorithm
Reads0
Chats0
TLDR
This paper studied the performance of the optimal file size to camouflage and the hidden data method with cover image using Least Significant bit (LSB) and showed that the larger cover image can hidden larger text file up to size of cover image vary to the size ofcover image that used for hidden data.Citations
More filters
Book ChapterDOI
A Secured Steganography Algorithm for Hiding an Image and Data in an Image Using LSB Technique
TL;DR: The least significant bit technique (LSB) may be an unremarkably used technique of activity data and is prone to attack owing to its simplicity as mentioned in this paper, however, it has been shown that the way to use the operator's image to cover a picture and different knowledge.
Book ChapterDOI
A Secured Steganography Technique for Hiding Multiple Images in an Image Using Least Significant Bit Algorithm and Arnold Transformation
TL;DR: Steganography LSB technique is used to hide the images in an image after that it used the scrambling Arnold technique to scramble the cover image and improved the security of the hidden image.
Journal ArticleDOI
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques
Iman Q. Abduljaleel,Zaid Ameen Abduljabbar,Mustafa A. Al Sibahee,Mudhafar Jalil Jassim Ghrabat,Jun Ling Ma,Vincent Omollo Nyangaresi +5 more
TL;DR: An approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images is presented.
Proceedings ArticleDOI
Multiple layered Security using combination of Cryptography with Rotational, Flipping Steganography and Message Authentication
TL;DR: Different approach towards Steganography implementation is proposed using rotations and flips to prevent detection of encoded messages and the HMAC (Hash-based Authentication Code) algorithm is chosen for message authentication and integrity.
Proceedings ArticleDOI
Smart Alarm Clock for Effective Sleep Health
TL;DR: In this article , the authors developed an alarm clock to help wake up at the set time without having to snooze the alarm and not being so sleepy that you have to go back to sleep again.
References
More filters
Journal ArticleDOI
A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security
Gurpreet Singh,Supriya Supriya +1 more
TL;DR: A survey of various Encryption Algorithms is presented and it is shown that the art of cryptography has become more complex in order to make information more secure.
Proceedings ArticleDOI
An improved LSB based image steganography technique for RGB images
Amritpal Singh,Harpal Singh +1 more
TL;DR: An improved LSB technique for color images by embedding the information into three planes of RGB image in a way that enhances the quality of image and achieves high embedding capacity is proposed.
Proceedings ArticleDOI
An improved method for LSB based color image steganography combined with cryptography
TL;DR: An improved LSB information hiding algorithm of color image using secret key is proposed, combining information hiding and cryptography, increasing the human eye visual features, and the identity authentication based on digital signature and encryption technology to improve the security of information hiding.
Journal ArticleDOI
Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution
Rupali Bhardwaj,Vaishali Sharma +1 more
TL;DR: Results showed that the proposed method gives better results than simple LSB and inverted LSB with higher PSNR and lower MSE, thus, reduces the chance of the hidden message being detected.
Proceedings ArticleDOI
Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm
TL;DR: This study proposed a combination of two Steganography domains coupled with Cryptography which aimed to make confidential information more secure and inaccessible to unauthorized persons.