LSB Steganography Using Pixel Locator Sequence with AES

12/04/2020
by   Sahil Gangurde, et al.
0

Image steganography is the art of hiding data into images. Secret data such as messages, audio, images can be hidden inside the cover image. This is mainly achieved by hiding the data into the LSB(Least Significant Bit) of the image pixels. To improve the security of steganography, this paper studied data encryption with AES(Advanced Encryption Standard) and LSB based data hiding technique with advanced user-defined encrypted data distribution in pixels other than the common linear computational method of storing data in a linear form. This data distribution file will contain the location of the data(in form of pixel numbers) to be encrypted/decrypted which is further encrypted with AES thus providing double encryption for data and its location stored over pixels. Steganography has many applications such as medical, military, copyright information, etc.

READ FULL TEXT

page 1

page 5

research
08/17/2018

Bitstream-Based JPEG Image Encryption with File-Size Preserving

An encryption scheme of JPEG images in the bitstream domain is proposed....
research
12/09/2019

On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks

This paper aims to evaluate the safety of a pixel-based image encryption...
research
09/10/2019

Image Steganography: Protection of Digital Properties against Eavesdropping

Steganography is the art of hiding the fact that communication is taking...
research
10/17/2021

Protection of the patient data against intentional attacks using a hybrid robust watermarking code

The security of patient information is important during the transfer of ...
research
07/04/2022

ID-based self-encryption via Hyperledger Fabric based smart contract

This paper offers a prototype of a Hyperledger Fabric-IPFS based network...
research
06/20/2021

SISA: Securing Images by Selective Alteration

With an increase in mobile and camera devices' popularity, digital conte...
research
02/10/2020

Adversarial Data Encryption

In the big data era, many organizations face the dilemma of data sharing...

Please sign up or login with your details

Forgot password? Click here to reset