Design of Image Steganography using LSB XOR Substitution Method

被引:0
|
作者
Arun, Chandni [1 ]
Murugan, Senthil [1 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Elect & Commun Engn, Amritapuri, India
关键词
Image Steganography; (least significant bit) LSB method; Cryptography; Encryption; Decryption; PSNR (peak to signal noise ratio); OPAP (Optimum pixel adjustment procedure);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is mainly investigates the design of image steganography, where steganography is depicted in different ways. Steganography was first initiated from Greek, although ancient people made a conception to communicate without the knowledge of the third person. Steganography is virtually categorized into 2 words where "stegano/stego" indicate as "covered" (where the messages are being hidden) and "graphy" indicate as writing. Here the method is used for describing the design is the LSB XOR substitution method whereas it improves the security usage. It is one of the more appropriate and simplest method among the other function. It is a method of data hiding method that is been used in favor of security purposes.. This paper is also attached to give a brief idea through algorithm using encryption and decryption technique which showcase the security betterment. Here we have a random 8 bit secret key that initially XOR with the RGB colors which leads to hold the embedding of data sharing and then after replace the LSB of pixel we get extracted data which is an actual message from encoding method.. It has the storage capacity to hide a large number of characteristics than the existing features of data hiding and also data sharing. The Modern steganography is used to provide a developed security on mobiles devices such as ensuring a security on the android and check and verify the latest operating system to add up some betterment in the device.
引用
收藏
页码:674 / 677
页数:4
相关论文
共 50 条
  • [1] A Secure Image Steganography using LSB and Double XOR Operations
    Ahmed, Ali
    Ahmed, Abdelmotalib
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (05): : 139 - 144
  • [2] Image Steganography Using Enhanced LSB Substitution Technique
    Arora, Arran
    Singh, Manish Pratap
    Thakral, Prateek
    Jarwal, Naveen
    [J]. 2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 386 - 389
  • [3] Image Steganography Using LSB Substitution Facilitated by Shared Password
    Gupta, Pragya
    Bhagat, Jayti
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 369 - 376
  • [4] Image steganography based on LSB substitution and encryption method: adaptive LSB+3
    Solak, Serdar
    Altinisik, Umut
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2019, 28 (04)
  • [5] Digital Image Steganography Using LSB Substitution, PVD, and EMD
    Pradhan, Anita
    Sekhar, K. Raja
    Swain, Gandharba
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [6] Image Steganography Based on Modified LSB Substitution Method and Data Mapping
    Dhar, Pranab Kumar
    Kaium, Abdul
    Shimamura, Tetsuya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 155 - 160
  • [7] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [8] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    [J]. Multimedia Tools and Applications, 2017, 76 : 8597 - 8626
  • [9] An LSB Substitution with Bit Inversion Steganography Method
    Akhtar, Nadeem
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 515 - 521
  • [10] LSB based Image Steganography by using the Fast Marching Method
    Huan, Xiaoli
    Zhou, Hong
    Zhong, Jiling
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (03) : 1 - 5