2022
DOI: 10.47760/ijcsmc.2022.v11i08.002
|View full text |Cite
|
Sign up to set email alerts
|

Bits Substitution to Secure LSB Method of Data Steganography

Abstract: Least significant bit of data hiding is one of the most popular used methods in data steganography, this method is simple and efficient, but it is not secure. In this research paper a modified LSB method version will be proposed, this version added a private key as an input of data hiding and data extracting. The private key will contain 8 components which provide a necessary key space to protect the hidden message. The PK key will be used to perform the required substitution and arrangement of the binary vers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The SM can be easily converted to binary to produce a message binary matrix, the 8_bits binary representation is to be used and MBM will contain 8 columns and number of rows equal the number of characters in the SM. MBM can be easily reshaped to 1 or more columns and vice versa, figure 1 show various methods of SM representation [55][56][57][58][59]. In this research paper SMs will be classified to short messages (with length up to 100 characters), medium messages (with length less or equal 1000 characters) and long messages (with length greater than 1000 characters) [49][50][51][52][53][54].…”
Section: Introductionmentioning
confidence: 99%
“…The SM can be easily converted to binary to produce a message binary matrix, the 8_bits binary representation is to be used and MBM will contain 8 columns and number of rows equal the number of characters in the SM. MBM can be easily reshaped to 1 or more columns and vice versa, figure 1 show various methods of SM representation [55][56][57][58][59]. In this research paper SMs will be classified to short messages (with length up to 100 characters), medium messages (with length less or equal 1000 characters) and long messages (with length greater than 1000 characters) [49][50][51][52][53][54].…”
Section: Introductionmentioning
confidence: 99%
“…Methods of protecting information varied between encryption and steganography. Encryption is the conversion of confidential data into an unreadable format [1] which is a sprinkling of letters that do not give any meaning only those who possess the encryption keys can decipher the text and return it to an understandable format [2].…”
Section: Introductionmentioning
confidence: 99%
“…Information hiding is the technique of protecting information from direct change or tampering with its content by unauthorized parties and delivering the information confidentially and securely to the requested party. The field of information hiding is considered important and vital due to its many applications in protecting copyrights, protecting personal information, credit cards, and exchanging confidential information [2].…”
Section: Introductionmentioning
confidence: 99%
“…The proposed of this research paper is to introduce a new method of DCI hiding-extracting, which will provide the following enhancement [41][42][43][44][45][46][47][48][49][50]: -Making the hiding capacity unlimited, by resizing the covering image, the size of the DCI to be hidden may be greater than the size of the covering image [51][52][53][54][55]. -Covering image may have any size and any type (gray image or color image).…”
Section: Introductionmentioning
confidence: 99%