ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Bits Substitution to Secure LSB Method of Data Steganography

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 8)

Publication Date:

Authors : ;

Page : 9-21

Keywords : Steganography; covering image; stego image; secret message; PK; substitution; MSE; PSNR;

Source : Downloadexternal Find it from : Google Scholarexternal


Least significant bit of data hiding is one of the most popular used methods in data steganography, this method is simple and efficient, but it is not secure. In this research paper a modified LSB method version will be proposed, this version added a private key as an input of data hiding and data extracting. The private key will contain 8 components which provide a necessary key space to protect the hidden message. The PK key will be used to perform the required substitution and arrangement of the binary version of the secret message. The proposed method will be tested for quality and performance to prove that the proposed method keeps the performance of the LSB method without changes. Several images will be used as a covering images and a recommendation will be suggested to keep the method efficient.

Last modified: 2022-08-11 01:00:55