{"title":"An Approach to Hide an Audio File in Image Using LSB Technique","authors":"Mohammed Majid Msallam","doi":"10.46649/150920-01","DOIUrl":null,"url":null,"abstract":"Recently, the world is interested in moving data between various devices. When The data transfer over the internet, maybe it attacks and reads or modifies on containing it. So, Data transmission must be encrypted before sending it to read and interpret by the intended receiver. Thus, information security is more critical than it used to be. This paper reflects the implementation of the two Least Significant Bit (LSB) techniques is named sequential LSB and sorted LSB. It is done by embedding a secret audio file into a cover file of the image using the LSB techniques with an approach to choose the hiding index. The work proposed uses the conventional approach to the LBS techniques under the name sequential LSB as the basic steganography model to compare my algorithm which called sorted LSB. Based on results, the sorted LSB produces is the same sequential LSB in which the stego image is not recognized by human eyes, but the security more complex than the LSB sequential.","PeriodicalId":389397,"journal":{"name":"Al-Furat Journal of Innovations in Electronics and Computer Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Al-Furat Journal of Innovations in Electronics and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46649/150920-01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, the world is interested in moving data between various devices. When The data transfer over the internet, maybe it attacks and reads or modifies on containing it. So, Data transmission must be encrypted before sending it to read and interpret by the intended receiver. Thus, information security is more critical than it used to be. This paper reflects the implementation of the two Least Significant Bit (LSB) techniques is named sequential LSB and sorted LSB. It is done by embedding a secret audio file into a cover file of the image using the LSB techniques with an approach to choose the hiding index. The work proposed uses the conventional approach to the LBS techniques under the name sequential LSB as the basic steganography model to compare my algorithm which called sorted LSB. Based on results, the sorted LSB produces is the same sequential LSB in which the stego image is not recognized by human eyes, but the security more complex than the LSB sequential.