Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
International Journal of Image, Graphics and Signal Processing, 2015
LSB is one of the well know methods for steganography. Using only steganography for security of message might be harmful in certain cases. Some of the other technologies can also be embedded with steganography for better security of messages. A lot of researchers have suggested encryption with steg anography. The present paper is presenting algorithm of LSB method of steganography with the use of java for encryption.
International Journal
African Journal of Computing & ICT, 2019
Secure data transmission over communication channels has been a critical issue since the beginning of the digital era. Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. Steganography is similar but adds another dimension to Cryptography. In cryptography, an intruder is normally aware that data is being communicated, because they can see the coded/scrambled message while in steganography, an unintended recipient or an intruder is unaware of the fact that observed data contains hidden information. In this method, people not only want to protect the secrecy of an information by concealing it, but they also want to make sure any unauthorized person gets no evidence that the information even exists. An example is invisible watermarking; although, this technique is not new, its application has been exploited in various information security technologies. This paper shows the design and implementation of a software system that uses the new image steganographic approach. This approach makes use of Least Significant Bit (LSB) algorithm and is implemented through the Microsoft.NET framework. This software is applied in embedding data into a bit map image (.bmp).
International Journal of Advanced Research, 2018
International Journal of Modern Trends in Engineering and Research, 2016
Steganography (1) is derived from the Greek word steganographic which means covered writing. It is the science of secret communication. The goal of steganography is to hide the existence of the message from unauthorized party. The modern secure image steganography presents a task of transferring the embedded information to the destination without being detected by the attacker. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. In the LSB approach, the basic idea is to replace the Least Significant Bits (LSB) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The LSB-based technique (2) is the most challenging one as it is difficult to differ...
2019
In this article, a new method is presented by adding bit shift of encrypted data in LSB method (SED-LSB). The message to be embedded in the cover image is encrypted by the key received from the user. Then, secret data are obtained by bit shifting operation using this encrypted text. Finally, the secret data is hidden inside the cover image using the LSB method. SED-LSB is performed by preparing GUI in MATLAB. The quality of the cover image is measured by Peak Signal-to-Noise Ratio (PSNR), besides the similarity between the cover and stego image is determined by the Structural Similarity Index (SSIM). The 512 x 512 size of colored images as Lena, Peppers, Fruits and Baboon are used to hide 87373 byte data. PSNR values are between 51.615 – 51.656 and SSIM values are between 0.99937 – 0.99982. In the proposed method, when data are hidden at a higher capacity, stego image is found not only secure but also high quality. Keywords— LSB, SED-LSB, Steganography, Cryptography, Security, PSNR,...
ijetrm journal, 2022
LSB method is one of the most popular methods used for secret messages steganography, this method is simple and easy to implement, but it is not secure and the message hidden in the image can be easily hacked. In this paper research a stage will be added to the LSB method to protect the hidden data and to increase the security level of LSB. The added stage transforms the holding image using complicated private key which contains the image color channel number where to hold the secret message, lower and higher gray values for both the holding image and the stego_image, using these parameters a special operators will be calculated to apply image transformation when hiding the message and image de-transformation when extracting the embedded secret message. The proposed method will be implemented to evaluate the efficiency issues and to show the added to LSB stage will affect the LSB efficiency.
Egitto e Vicino Oriente 46: 75-93.
Throughout the second half of the first millennium BCE, Memphis was the major metropolis of Egypt. Despite this, there has been a lack of research into the familial connections among the temple personnel of the city. This study seeks to reconstruct the genealogy of a notable priestly family, labelled here “the House of It(Ꜣ)”, which can be documented for seven generations between the late eighth century BCE and the mid-sixth century BCE. A comprehensive review of the available sources revealed that this family had maintained their roles in local religious institutions throughout all known generations. Marrying within their temple community strengthened the family’s authority and carried their lineage onward. The Ptah temple complex, the city’s main sacred space, was paramount to their reputation and prosperity. Another area where activities were conducted by this family was the Memphite necropolis, mainly the region between Saqqara and Giza. In addition, some members of the family, akin to many of the state officials at the time, managed both the temple and royal palace affairs.
Asmaul kusna, 2020
Tugas Akuntansi Keuangan Lanjutan II
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
East European Jewish Affairs, 50:1-2, 259-260,, 2020
ARTIFICIA MIRABILIA, 2022
Revista Conrado, 2021
con una postfazione dal 1861 al 2021 (pp. 641-669), 2021
Artifact: Journal of Virtual Design, 2006
Physics Letters B, 2012
Analytical and Bioanalytical Chemistry, 2013
Die kolonialen Ursprünge moderner Sozialtheorie Französische Soziologie und das Überseeimperium , 2024
Orphanet Journal of Rare Diseases, 2021
SSRN Electronic Journal, 2015