2023
DOI: 10.21203/rs.3.rs-2579014/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Huffman Code LSB based Image Steganography Technique Using Multi-Level Encryption and Achromatic Component of an image

Abstract: It is essential in the field of cover steganography to track down a mechanism for concealing data by utilizing different blends of compression strategies. Amplifying the payload limit, robust, and working on the visual quality is the essential factors of this research to make a reliable mechanism. We can’t compromise on image quality up to a confident flat because it halts the concepts of cover steganography while the maximum embedding limit is also the main factor that makes the technique more efficient. So, … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Rahman and colleagues introduced a technique that combines Huffman coding, Least Significant Bits (LSB) for steganographic cover, and Multi-Level Encryption (MLE) alongside the achromatic segment of the image, as described in their work [25]. Various techniques of DNA-based cryptography have been developed over the years.…”
Section: Steganographymentioning
confidence: 99%
“…Rahman and colleagues introduced a technique that combines Huffman coding, Least Significant Bits (LSB) for steganographic cover, and Multi-Level Encryption (MLE) alongside the achromatic segment of the image, as described in their work [25]. Various techniques of DNA-based cryptography have been developed over the years.…”
Section: Steganographymentioning
confidence: 99%
“…Building on this need, methods of steganography have emerged to conceal sensitive information within ordinary-looking objects or media, masking the presence of confidential data and avoiding unwanted attention (8,9). For instance, the traditional least significant bit substitution (10)(11)(12)(13) method digitally modifies the least noticeable bits of the pixel values in an image to embed secret data, making changes that are invisible to the human eye. Another digital approach involves the use of transform-domain techniques, where the confidential data are embedded in frequency components of the image, using digital algorithms based on, e.g., discrete cosine transforms or wavelets (9,(14)(15)(16).…”
Section: Introductionmentioning
confidence: 99%