Secure Secret Key Transfer Using Modified Hash Based LSB method
نویسندگان
چکیده
Recent advancements in computer security have shifted the focus of security officials from, using only the cryptography techniques to using steganography as well, or the combination of both. In steganography the most widely used technique is the LSB method, but this technique being the simplistic of all, is well known and hence is vulnerable to attacks. However, modifying the LSB method to the point where it would be difficult or impractical to find the hidden message is a domain where an extensive work and research is required. Due to the simplistic nature of the LSB method, this technique can be modified easily. But the main crux lies in the way this modification is done. Therefore, in this paper we discuss a modified version of the LSB, a Hash Based LSB technique and a hiding method that further hides the existence of the message into the cover image. We call this hiding method as the 'XOR Feed' method. Keywords— Modified Hash Based LSB, XOR Feed, Image Steganography, Spatial Domain, Grayscale Image.
منابع مشابه
A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique
Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Ther...
متن کاملLSB Based Steganography using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission
A large number of commercial steganographic programs use the Least Significant Bit(LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity. Although there has been an extensive research work in the past, but majority of the work has no much optimal consideration for robust security towards the encrypted image. The proposed system p...
متن کاملOptimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملHash Based Least Significant Bit Technique for Video Stegonagraphy(hlsb)
Video Steganography deals with hiding secret data or information within a video. In this paper, a hash based least significant bit (LSB) technique has been proposed. A spatial domain technique where the secret information is embedded in the LSB of the cover frames. Eight bits of the secret information is divided into 3,3,2 and embedded into the RGB pixel values of the cover frames respectively....
متن کاملA Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with Watermarking: A Survey
Today’s large demand of internet applications requires data to be transmitted in a better manner. Data is transferred in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the better solution for this issue is Steganography, which is the technique of writing hidden messages in such a way that no one, apart from the sender and main rec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014