SAFEGUARDING HIGHLY CONFIDENTIAL MESSAGES IN 7-BIT ASCII USING THE LSB TECHNIQUE IN THE SPATIAL DOMAIN
Keywords:
LSB, Security, Confidentiality, Spatial Domain, Image SteganographyAbstract
With the rapid advancement of technology, a vast amount of data is shared over networks, highlighting the need for strong security measures to protect data confidentiality. Steganography has become a popular technique for securing sensitive messages from unauthorized access. Although many existing image steganography techniques utilize an 8-bit format to convert text into binary, our proposed system enhances security by incorporating a single layer of protection for the secret messages within the spatial domain. In our proposed model, input text is converted into a 7-bit binary format and embedded into the various color channels of each pixel of the cover image using the Least Significant Bit (LSB) technique. This ensures that the changes to the image are not noticeable to the human eye, preserving the image's visual quality. By utilizing these methods, our system increases embedding capacity and strengthens the security of confidential messages, providing an effective way to conceal sensitive information in digital communications without detection
References
Swain, G. (2016). Digital image steganography using variable length group of bits substitution. Procedia Computer Science, 85, 31-38.
Shanthakumari, R., & Malliga, S. (2019). Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment. Sādhanā, 44(5), 1-12.
Elmasry, W. (2018). New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check. Sādhanā, 43(5), 1-14.
Solak, S., & Altinişik, U. (2018). The Least Significant Two-bit Substitution Algorithm for Image Steganography. International Journal of Computer (IJC), 31(1), 150-156.
Pramanik, S., Singh, R. P., & Ghosh, R. (2019). A new encrypted method in image steganography. Indonesian Journal of Electrical Engineering and Computer Science, 14(3), 1412-1419.
Sugathan, S. (2016, July). An improved LSB embedding technique for image steganography. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (pp. 609-612). IEEE.
Sahu A. K., & Swain G. (2018). Pixel overlapping image steganography using PVD and modulus function. 3D Research, 9(3), 1-14.
Al_Barazanchi, I., Shawkat, S. A., Hameed, M. H., & Al-Badri, K. S. L. (2019). Modified RSA-based algorithm: A double secure approach. TELKOMNIKA, 17(6), 2818-2825.
AlKhamese, A. Y., Shabana, W. R., & Hanafy, I. M. (2019, February). Data security in cloud computing using steganography: a review. In 2019 International Conference on Innovative Trends in Computer Engineering (ITCE) (pp. 549-558). IEEE.
Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2019). A comparative study of recent steganography techniques for multiple image formats. International Journal of Computer Network and Information Security, 11(1), 11-25.
Al-Kaabi, S. S., & Belhaouari, S. B. (2019). Methods toward Enhancing RSA Algorithm: A Survey. International Journal of Network Security & Its Applications (IJNSA) Vol, 11.
Awadh, W. A., Hashim, A. S., & Hamoud, A. (2019). A Review of Various Steganography Techniques in Cloud Computing. University of Thi-Qar Journal of Science, 7(1), 113-119.
Rasras, R. J., AlQadi, Z. A., & Sara, M. R. A. (2019). A methodology based on steganography and cryptography to protect highly secure messages. Engineering, Technology & Applied Science Research, 9(1), 3681-3684.
Majumder, S., & Rahman, M. M. (2019, February). Implementation of Security Enhanced Image Steganography with the Incorporation of Modified RSA Algorithm. In 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE) (pp. 1-5). IEEE.
Islam, M. A., Islam, M. A., Islam, N., & Shabnam, B. (2018). A modified and secured RSA public key cryptosystem based on “n” prime numbers. Journal of Computer and Communications, 6(03), 78.
Thangavel, M., Varalakshmi, P., Murrali, M., & Nithya, K. (2015). An enhanced and secured RSA key generation scheme (ESRKGS). Journal of information security and applications, 20, 3-10.
Minni, R., Sultania, K., Mishra, S., & Vincent, D. R. (2013, July). An algorithm to enhance security in RSA. In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-4). IEEE.
Mathur, S., Gupta, D., Goar, V., & Kuri, M. (2017, February). Analysis and design of enhanced RSA algorithm to improve the security. In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT) (pp. 1-5). IEEE.
Gupta, A., & Ahuja, S. (2018, October). An improved image steganography technique using block division & least significant bit approach. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 335-339). IEEE.
Setiadi, De Rosal Ignatius Moses (2019). Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. Journal of King Saud University - Computer and Information Sciences, (), S1319157819313199–. doi:10.1016/j.jksuci.2019.12.007
Setyono, A. (2019, March). Securing and hiding secret message in image using XOR transposition encryption and LSB method. In Journal of Physics: Conference Series (Vol. 1196, No. 1, p. 012039). IOP Publishing.
Ranjan, A., & Bhonsle, M. (2016). Advanced System to Protect and Shared Cloud Storage Data using Multilayer Steganography and Cryptography. International Journal of Engineering Research, 5(6), 434-438.
Santoso, H. A., Rachmawanto, E. H., & Sari, C. A. (2018, March). An improved message capacity and security using divide and modulus function in spatial domain steganography. In 2018 international conference on information and communications technology (ICOIACT) (pp. 186-190). IEEE.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Karthikeyan N, Subathra (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.