scholarly journals A Novel Framework for Information Hiding and Image Encryption using Least Significant Bit Techniques

2014 ◽  
Vol 2 (3) ◽  
Author(s):  
H.B Kekre ◽  
Tanuja Sarode ◽  
Pallavi N. Halarnkar

2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance



2021 ◽  
Vol 26 (1) ◽  
pp. 135-142
Author(s):  
Kanusu Srinivasa Rao ◽  
Mandapati Sridhar

The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information and decrypts secret using mechanical operations without any computation, but each share need pixel expansion. In the current work, we propose an Image encryption technique using (n, n) Visual cryptography based on simple operations without pixel expansion. The proposed novel technique gives an image encryption using visual cryptography based on Least significant bit (LSB) technique in spatial domain and parity mechanism using Exclusive-OR(XOR) operation. developed for encrypting grey scale image. Image encryption and decryption uses simple Boolean operations. The technique provides better quality of shares and recovers without any loss.



2019 ◽  
Vol 8 (2S11) ◽  
pp. 3801-3808

‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..



2011 ◽  
Vol 271-273 ◽  
pp. 1120-1123
Author(s):  
Ya Luo ◽  
Yang Li

The analysis technology of Information hiding is introduced. Through the analysis of examples of the different carriers embedded in the same format images and the same carriers embedded in different format images, difference histogram can be used to detect the information hiding in least significant bit. Then, the validity of forgoing method is shown by simulation.



2021 ◽  
Vol 13 (6) ◽  
pp. 0-0

Aiming at the problem that the data hiding algorithm of high efficiency video coding (HEVC) has great influence on the video bit rate and visual quality, an information hiding algorithm based on intra prediction mode and matrix coding is proposed. Firstly, 8 prediction modes are selected from 4×4 luminance blocks in I frame to embed the hidden information. Then, the Least Significant Bit (LSB) algorithm is used to modulate the LSB of the last prediction mode. Finally, the modulated luminance block is re-encoded to embed 4 bits secret information. Experimental results show that the algorithm improves the embedding capacity, guarantees the subjective and objective quality of the video, and the bit rate increases by 1.14% on average.



2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Mandeep Kaur ◽  
Surender Singh ◽  
Manjit Kaur

Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers. They use different concepts for image encryption to increase security. The main aim of this paper is to present a comprehensive review of the existing image encryption approaches. These approaches are categorized based on different concepts such as chaotic maps, DNA, compressive sensing, and optical image encryption. Comparisons are made among the existing approaches to access the various security parameters. Key performance metrics are also presented. The future scope of image encryption is also presented to encourage the research community.



2013 ◽  
Vol 63 (13) ◽  
pp. 24-28 ◽  
Author(s):  
Komal Patel ◽  
Sumit Utareja ◽  
Hitesh Gupta


2010 ◽  
Vol 20-23 ◽  
pp. 1247-1252
Author(s):  
Shi Hua Zhou ◽  
Qiang Zhang ◽  
Xiao Peng Wei

Image encryption is one of the most important methods of image information hiding. A new image encryption method based on some techniques and knowledge of genetic engineering for image hiding is presented in this paper. This method is implemented by using modern biological techniques as tools and biological hard problems as main security basis to fully exert the special advantages. The keys are some substances of biological materials such as restriction endonuclease, polymerase and so on, the preparation flow and the experimental conditions. The analysis demonstrates that the image encryption algorithm is feasible and highly secure. Moreover, the size of the decrypted image is the same as the original image so that it can be applied for image hiding and be transmitted via the Internet.



Author(s):  
Shailender Gupta,Ankur Goyal ◽  
Bharat Bhushan


Author(s):  
Lina Yang ◽  
Haiyu Deng ◽  
Ren Ping Liu ◽  
Patrick Wang ◽  
Xiaocui Dang ◽  
...  

Smart home is an emerging form of the Internet of Things (IoT), enabling people to enjoy a convenient and intelligent life. The data generated by smart home devices are transmitted through the public channel, which is not secure enough, so the secret data in smart home are easily intercepted by malicious adversaries. In order to solve this problem, this paper proposes a smart home privacy protection method combining DES encryption and the improved Least Significant Bit (LSB) information hiding algorithm, changing the practice of directly exposing smart home secret information to the Internet, first, using Data Encryption Standard (DES) encryption to encrypt the smart home information and second, the improved LSB information hiding algorithm is used to hide the ciphertext, so that the adversary cannot detect the smart home secret information. The goal of the scheme is to provide a double protection for the secure transmission of the smart home secret information. If an attacker wants to carry out an attack, it has to break through at least two defense lines, which seems impossible to do. Experiment results show that the improved LSB algorithm is more robust than the existing algorithms, and it is very safe. Therefore, the scheme proposed in this paper is very practical for protecting the smart home secret information.



Sign in / Sign up

Export Citation Format

Share Document