Two PKs to Protect LSB Method of Data Steganography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 8)Publication Date: 2022-08-30
Authors : Ziad Alqadi;
Page : 45-66
Keywords : Steganography; cryptography; PK; CK; CLMM; lockup table; MSE; PSNR; CC; NSCR; throughput;
Abstract
LSB method of data steganography is very popular and easy method of data hiding, but it si not secure. In this research paper a simple and easy modifications will be added to LSB method to increase the security level of data hiding. Two PKs will be used to protect the hidden secret message, the first PK1 will be generated using a selected parameter values to run CLMM, this key will be converted to form a lockup table to apply message encryption-decryption. The second PK2 will be used to apply bits' substitution of the character binary matrix, the two keys will provide a necessary key space, which can resist hacking attacks, the two keys will be sensitive to any minor changes in the PKs contents, any changes in the PKs values in the message retrieving phase will be considered as a hacking attempt. The proposed method will be implemented using various messages and various covering images, the obtained results will be analyzed, several types of results analysis will be performed to prove the quality, performance, security and sensitivity of the proposed method.
Other Latest Articles
- DOES THE INTENSIFICATION OF URBAN AND RURAL AGRICULTURE IN BENIN CONTRIBUTE TO THE EMERGENCE OF ENZYMATIC ACTIVITY IN ANOPHELES GAMBIAESENSULATO?
- A Review of Rabies Treatment Methods in Ancient Iran
- CLINICAL SIGNIFICANCE AND CHANGES IN THE MORPHOLOGY OF PLACENTA IN PREGNANCY INDUCED HYPERTENSION
- CARDIAC DISEASE IN PREGNANCY AND MATERNAL OUTCOME - A RETROSPECTIVE STUDY
- Structural semantic features of the toponyms in English and Uzbek languages
Last modified: 2022-08-28 18:26:24