ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM

Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.4, No. 1)

Publication Date:

Authors : ; ;

Page : 685-690

Keywords : Steganography; Cryptography; Encryption; Decryption; Extended Square Substitution Algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab.

Last modified: 2013-12-06 13:40:32