ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Two PKs to Protect LSB Method of Data Steganography

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 8)

Publication Date:

Authors : ;

Page : 45-66

Keywords : Steganography; cryptography; PK; CK; CLMM; lockup table; MSE; PSNR; CC; NSCR; throughput;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

LSB method of data steganography is very popular and easy method of data hiding, but it si not secure. In this research paper a simple and easy modifications will be added to LSB method to increase the security level of data hiding. Two PKs will be used to protect the hidden secret message, the first PK1 will be generated using a selected parameter values to run CLMM, this key will be converted to form a lockup table to apply message encryption-decryption. The second PK2 will be used to apply bits' substitution of the character binary matrix, the two keys will provide a necessary key space, which can resist hacking attacks, the two keys will be sensitive to any minor changes in the PKs contents, any changes in the PKs values in the message retrieving phase will be considered as a hacking attempt. The proposed method will be implemented using various messages and various covering images, the obtained results will be analyzed, several types of results analysis will be performed to prove the quality, performance, security and sensitivity of the proposed method.

Last modified: 2022-08-28 18:26:24