Data Hiding using Advanced LSB with RSA Algorithm
نویسندگان
چکیده
منابع مشابه
Data Hiding using Advanced LSB with RSA Algorithm
In this paper, RSA algorithm is used to encrypt the secret message and advanced LSB technique is used to hide the encrypted message. Firstly, the message is encrypted and then encrypted message is being divided in two parts. First part of the encrypted message is xored with odd position and second part with even position of LSB+1. After that the xored encrypted message is being hidden on LSB po...
متن کاملSteganographic Approach for Data Hiding using LSB Techniques
Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as ...
متن کاملData Hiding in Video using Triangularization LSB Technique
The importance of data hiding in the field of Information Technology is a widely accepted. The challenge is to be able to pass information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Steganography is a technique that has been widely used to achieve this objective. However Steganography is often found to be lacking when it ...
متن کاملHigh Capacity data hiding using LSB Steganography and Encryption
The network provides a method of communication to distribute information to the masses. With the growth of data communication over computer network, the security of information has become a major issue. Steganography and cryptography are two different data hiding techniques. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the...
متن کاملData Hiding by LSB Substitution Using Genetic Optimal Key-Permutation
The least significant bit (LSB) embedding method is one of the most commonly used techniques; it targets the LSB's of the host image to hide the data. This paper deals with three main steganography challenges (i.e. capacity, imperceptibility, and security). This is achieved by hybrid data hiding scheme incorporates LSB technique with a key-permutation method. The paper also proposes an optimal ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/21691-4796