2013
DOI: 10.5120/10527-5510
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm

Abstract: Security is the most challenging aspects in the World Wide Web. In present time information sharing and transfer has increased exponentially. So to find out best solution this is providing necessary protection of our data against malicious attacks from intruders. Cryptography and Steganography are the two major techniques for secret communication. Cryptography converts information from its original form (plaintext) into unreadable form (cipher text); where as in steganography the secret message is hidden into … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 5 publications
(2 reference statements)
0
5
0
Order By: Relevance
“…In the present data age, the progressions have developed so much that a substantial part of the customers slant toward web to trade data beginning with one end then onto the following over the world. So security in cutting edge correspondence is major essential when grouped information is being shared between two customers [5]. Steganography is a procedure of concealing data.…”
Section: A Overview Of Steganographymentioning
confidence: 99%
“…In the present data age, the progressions have developed so much that a substantial part of the customers slant toward web to trade data beginning with one end then onto the following over the world. So security in cutting edge correspondence is major essential when grouped information is being shared between two customers [5]. Steganography is a procedure of concealing data.…”
Section: A Overview Of Steganographymentioning
confidence: 99%
“…The extracting process restores the secret image by operating the initial Moire grating and the Moire pattern. In the same year, Jiang et al [25] also proposed a quantum image steganography algorithm based on the least significant bit (LSB [32]). Two different embedding methods are given according to the selection regions of quantum carrier image.…”
Section: Introductionmentioning
confidence: 99%
“…Images created from pixels which contain three colors red, green and blue are called as RGB. Each pixel color includes one byte-sized information that indicates the density of the image's color [1].…”
Section: Introductionmentioning
confidence: 99%