229
Views
6
CrossRef citations to date
0
Altmetric
Research Article

A modified LSB image steganography method using filtering algorithm and stream of password

ORCID Icon, , , &

References

  • Broda, M., Hajduk, V., & Levický, D. (2015). Image steganography based on combination of YC b C r color model and DWT. 2015 57th international symposium ELMAR (ELMAR). Zadar, Croatia.
  • Chandramouli, R., & Memon, N. (October 2001). Analysis of LSB based image steganography techniques. In Proceedings 2001 International Conference on Image Processing (Cat. No. 01CH37205), 3, 1019–1022. IEEE. https://doi.org/https://doi.org/10.1109/ICIP.2001.958299
  • Charan, G. S., SSV, N. K., Karthikeyan, B., & Vaithiyanathan, V. (2015). A novel LSB based image steganography with multi-level encryption. 2015 international conference on innovations in information, embedded and communication systems (ICIIECS). Coimbatore, India.
  • Chen, P. Y., & Lin, H. J. (2006). A DWT based approach for image steganography. International Journal of Applied Science and Engineering, 4(3), 275–290. https://doi.org/https://doi.org/10.6703/IJASE/2006.4(3).275
  • Deeba, F., Kun, S., Dharejo, F. A., & Memon, H. (2020). Digital image watermarking based on ANN and least significant bit. Information Security Journal: A Global Perspective, 29(1), 30–39. https://doi.org/https://doi.org/10.1080/19393555.2020.1717684
  • Delenda, S., & Noui, L. (2018, May 4). A new steganography algorithm using polar decomposition. Information Security Journal: A Global Perspective, 27(3), 133–144. https://doi.org/https://doi.org/10.1080/19393555.2018.1454557
  • Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E., & Mohamed, E. (2018). A secure image steganography algorithm based on least significant bit and integer wavelet transform. Journal of Systems Engineering and Electronics, 29(3), 639–649. https://doi.org/https://doi.org/10.21629/JSEE.2018.03.21
  • Ghosal, S. K. (2011). A new pair wise bit based data hiding approach on 24 bit color image using steganographic technique. Greater Kolkata College of Engineering & Management.
  • Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
  • Islam, M. R., Siddiqa, A., Palash, U., Md., Mandal, A. K., & Hossain, M. D. (23–24 May 2014). An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. 2014 International Conference on Informatics, Electronics & Vision (ICIEV). Dhaka, Bangladesh.
  • Joshi, K., & Yadav, R. (21–24 December. 2015). A new LSB-S image steganography method blend with Cryptography for secret communication. 2015 Third International Conference on Image Information Processing (ICIIP). Waknaghat, India.
  • Kaur, D., Verma, H. K., & Singh, R. K. (2016). A hybrid approach of image steganography. 2016 International Conference on Computing, Communication and Automation (ICCCA). Noida, India.
  • Kaur, N., & Behal, S. (2014). A survey on various types of steganography and analysis of hiding techniques. International Journal of Engineering Trends and Technology, 11(8), 388–392. https://doi.org/https://doi.org/10.14445/22315381/IJETT-V11P276
  • Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6), 441–444. https://doi.org/https://doi.org/10.1109/LSP.2005.847889
  • Khalaf, E. T., & Sulaiman, N. (2011). Segmenting and hiding data randomly based on index channel. International Journal of Computer Science Issues (IJCSI), 8(3), 522.
  • Lai, C. C., & Tsai, C. C. (2010). Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transactions on Instrumentation and Measurement, 59(11), 3060–3063. https://doi.org/https://doi.org/10.1109/TIM.2010.2066770
  • Li, X., Zeng, T., & Yang, B. (2008). Detecting LSB matching by applying calibration technique for difference image. Proceedings of the 10th ACM workshop on Multimedia and security, Oxford, United Kingdom. https://doi.org/https://doi.org/10.1145/1411328.1411353
  • Loukhaoukha, K., Chouinard, J.-Y., & Berdai, A. (2012, March 7). A secure image encryption algorithm based on Rubik’s cube principle. Journal of Electrical and Computer Engineering, 2012, 173931. https://doi.org/https://doi.org/10.1155/2012/173931
  • Majeed, A., Mat Kiah, M. L., Madhloom, H. T., Zaidan, B., & Zaidan, A. (2009). Novel approach for high secure and high rate data hidden in the image using image texture analysis. International Journal of Engineering and Technology, 1(2), 63–69. http://eprints.um.edu.my/4951/
  • Mukhedkar, M., Powar, P., & Gaikwad, P. (17–20 December. 2015). Secure non real time image encryption algorithm development using cryptography & steganography. 2015 Annual IEEE India Conference (INDICON), New Delhi, India.
  • Phadte, R. S., & Dhanaraj, R. (2017). Enhanced blend of image steganography and cryptography. 2017 International Conference on Computing Methodologies and Communication (ICCMC), Erode, India.
  • Raniprima, S., Hidayat, B., & Andini, N. (2016). Digital image steganography with encryption based on rubik’s cube principle. 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC),Bandung, Indonesia.
  • Ren-Er, Y., Zhiwei, Z., Shun, T., & Shilei, D. (2014). Image steganography combined with DES encryption pre-processing. 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation,Zhangjiajie, China.
  • Shehzad, D., & Dag, T. (4–5 August. 2017). A novel image steganography technique based on similarity of bits pairs. 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia.
  • Shirafkan, M. H., Akhtarkavan, E., & Vahidi, J. (5–6 November. 2015). A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed-solomon encoding. 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI),Tehran, Iran.
  • Singh, K. M., Singh, L. S., Singh, A. B., & Devi, K. S. (7–9 March 2007). Hiding Secret Message in Edges of the Image. 2007 International Conference on Information and Communication Technology, Dhaka, Bangladesh.
  • Sultana, S., Khanam, A., Islam, M. R., Nitu, A. M., Uddin, M. P., Afjal, M. I., & Rabbi, M. F. (2018). A modified filtering approach of LSB image steganography using stream builder along with AES encryption. HBRP Recent Trends in Information Technology and Its Applications, 1(2), 1–10. http://hbrppublication.com/OJS/index.php/RTITIA/article/view/272
  • Tiwari, R. K., & Sahoo, G. (2011, February 11). A novel methodology for data hiding in PDF files. Information Security Journal: A Global Perspective, 20(1), 45–57. https://doi.org/https://doi.org/10.1080/19393555.2010.544703

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.