CFP last date
20 May 2024
Reseach Article

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

by Noor Kareem Jumaa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 13
Year of Publication: 2015
Authors: Noor Kareem Jumaa
10.5120/19886-1913

Noor Kareem Jumaa . Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator. International Journal of Computer Applications. 113, 13 ( March 2015), 20-27. DOI=10.5120/19886-1913

@article{ 10.5120/19886-1913,
author = { Noor Kareem Jumaa },
title = { Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 13 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number13/19886-1913/ },
doi = { 10.5120/19886-1913 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:50.806478+05:30
%A Noor Kareem Jumaa
%T Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 13
%P 20-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world of growing technology, network security and protection of data have been of great concern. Steganography is the art of hiding a private message with in a cover file in such a manner that third party cannot know the existence of the hidden message. Steganography has many different forms like LSB, transforms, masking, and filtering technique. Enhanced LSB technique is main concern of this paper. The implementation in this paper is concern with five features. First one is deal with the generation of truly random and secure encryption key, second feature deals with encrypt the secret message using AES algorithm, third feature deals with generation of permutation technique to distribute the encrypted message bits randomly, fourth feature dealing with generation of random pixels number in order to hide the secret encrypted message bits inside them, finally the fifth features id dealing with the hiding the random ciphertext bits within random image pixels. This paper proposed an enhanced hiding system with analysis of the proposed system.

References
  1. Ashish kumari, Shyama Sharma, and Navdeep Bohra, "Implementation of IMAGE STEGANOGRAPHY Based on Random LSB", International Journal of Computer Science and Management Studies (IJCSMS), Vol. 12, Issue 01, 2012.
  2. Mamta Juneja and Parvinder Singh Sandhu, " Information Hiding using Improved LSB Steganography and Feature Detection Technique" , International Journal of Engineering and Advanced Technology (IJEAT), Volume-2, Issue-4, ISSN: 2249 – 8958, 2013.
  3. Dr. Shubhangi D. C and Manikamma Malipatil, "Authontication Watermarking for Transmission of Hidden Data Using Biometrics Technique", International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 5, ISSN 2250-2459, 2012.
  4. ELTYEB E. ABED ELGABAR and FAKHRELDEEN A. MOHAMMED, "JPEG versus GIF Images in forms of LSB Steganography", International Journal of Computer Science and Network (IJCSN), Volume 2, Issue 6, 2013.
  5. Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, no. 79, 3907 – 3915, 2012.
  6. Babita and Mrs. Ayushi, "Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique", International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4, No. 06, ISSN : 2229-3345, 2013.
  7. K. Chandra Sekhar, M. Chandra Sekhar, and Mr. K. Chokkanathan, " teganography: A Security Model for Open Communication", Int. J. Advanced Networking and Applications, Volume: 04, Issue: 04, Pages:1690-1694, ISSN : 0975-0290, 2013.
  8. Henk C. A. van Tilborg (Ed. ), "Encyclopedia of cryptography and security", pp. 159, Springer, 2005.
  9. Jyotika Kapur and Akshay. J. Baregar, "Security using image processing", International Journal of Managing Information Technology (IJMIT) Vol. 5, No. 2, 2013.
  10. Dr. Ashish Negi et al. ," Cryptography Playfair Cipher using Linear Feedback Shift Register", IOSR Journal of Engineering, Vol. 2(5) pp: 1212-1216, ISSN: 2250-3021, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Information hiding AES steganography LSB ciphertext