Comparison Study Between Simple LSB and Optimal LSB Image Steganography

M. Mohamed, M. Mofaddel, T. Abd El-Naser
{"title":"Comparison Study Between Simple LSB and Optimal LSB Image Steganography","authors":"M. Mohamed, M. Mofaddel, T. Abd El-Naser","doi":"10.21608/sjsci.2022.165686.1036","DOIUrl":null,"url":null,"abstract":": There is no denying communication’s role in the evolution of the internet and other digital technologies. Information comes in many forms, and its conveyance necessitates a wide variety of methods of communication. We must communicate these types of data over a secure communication channel on the internet because they include confidential and sensitive information. One of the most challenging issues was figuring out how to send sensitive information without raising suspicion. Cryptography and steganography are just two examples of many methods used to conceal information from prying eyes, all to protect sensitive data from being misused or altered by unauthorized parties. Using an encryption method, cryptography transforms information from its original, easily decipherable form (plain text) into a completely meaningless one (cipher text). We can also use a decryption technique to change the encrypted text back into plain text. Steganography is a technique used to transmit information through other forms of digital media secretly. Due to the difficulty in visually detecting hidden data, the image will serve as the cover media for this thesis. The well-known method used to conceal confidential information is LSB (Least Significant Bit). The LSB method is based on exchanging bits of the cover medium for bits of private data.","PeriodicalId":146413,"journal":{"name":"Sohag Journal of Sciences","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sohag Journal of Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/sjsci.2022.165686.1036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

: There is no denying communication’s role in the evolution of the internet and other digital technologies. Information comes in many forms, and its conveyance necessitates a wide variety of methods of communication. We must communicate these types of data over a secure communication channel on the internet because they include confidential and sensitive information. One of the most challenging issues was figuring out how to send sensitive information without raising suspicion. Cryptography and steganography are just two examples of many methods used to conceal information from prying eyes, all to protect sensitive data from being misused or altered by unauthorized parties. Using an encryption method, cryptography transforms information from its original, easily decipherable form (plain text) into a completely meaningless one (cipher text). We can also use a decryption technique to change the encrypted text back into plain text. Steganography is a technique used to transmit information through other forms of digital media secretly. Due to the difficulty in visually detecting hidden data, the image will serve as the cover media for this thesis. The well-known method used to conceal confidential information is LSB (Least Significant Bit). The LSB method is based on exchanging bits of the cover medium for bits of private data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
简单LSB与最优LSB图像隐写的比较研究
不可否认,通信在互联网和其他数字技术的发展中发挥了重要作用。信息有多种形式,信息的传递需要多种多样的沟通方式。我们必须通过互联网上的安全通信通道传送这些类型的数据,因为它们包含机密和敏感信息。最具挑战性的问题之一是如何在不引起怀疑的情况下发送敏感信息。密码学和隐写术只是许多方法中的两个例子,这些方法用于隐藏信息以防止窥探,所有这些方法都是为了保护敏感数据不被未经授权的各方滥用或修改。密码学使用一种加密方法,将信息从原始的、易于破译的形式(明文)转换为完全没有意义的形式(密文)。我们还可以使用解密技术将加密文本更改回纯文本。隐写术是一种通过其他形式的数字媒体秘密传输信息的技术。由于视觉检测隐藏数据的困难,本文将图像作为封面媒体。用于隐藏机密信息的众所周知的方法是LSB(最低有效位)。LSB方法基于将覆盖介质的位交换为私有数据位。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Sumudu Transform Pade' Approximation Method for Solving Fractional Physical Models Biochemical Studies in The Effect of Nitrite Ion in Pre-chlorinated Drinking Water in Sohag Governorate on Male Albino Rats and Treatment with Vitamin C Comparative Study for the Electrodeposited Cadmium Chalcogenide by Potentiostatic and Potentiodynamic Methods for Electrochemical Reduction of CO2 Development of New Mixed Cu(II) Chelate Based on 2-Benzimidazolylguanidine and Phenanthroline Ligands: Structural Elucidation, Biological Evaluation, DFT and Docking Approaches Impact of Cold Atmospheric Plasma Treatment Duration on Distilled Water Physicochemical Characteristics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1