ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

LSB8 using DSF to Hide Secret Message

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.13, No. 2)

Publication Date:

Authors : ; ;

Page : 13-26

Keywords : Steganography; SM; DSF; stego file; covering file; PK; CK; IKEY; LSB8;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

An efficient method of message steganography will be proposed, the method will use 8 bits from the speech sample binary value to hold one character from the secret message, thus the capacity hiding will equal the covering DSF size. Using lower LSBs of the speech sample binary value will not much affect the sample value, so the quality of the stego DSF will be excellent and the stego file will be closed to the covering file. The proposed method will add an extra security issues by using a private key, this key will be used to calculate the starting sample where to start characters hiding, it will determine the starting LSB to get the set of 8 LSBs, and it will be also used to generate eight element chaotic key, this key will be converted to 8 orders of LSBs to hide the bits of characters, these bit will be not consecutive. The PK will a long enough long provide a good key space capable to resist hacking attempt and the extracted message will be very sensitive to the selected values of the private key. The proposed method will provide enhancements in the quality, security, speed and sensitivity of message steganography, these enhancements will be proved based on the discussing of obtained experimental results.

Last modified: 2024-02-13 22:02:02