Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Data Hiding using Advanced LSB with RSA Algorithm

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 4
Year of Publication: 2015
Authors:
Varsha
Rajender Singh Chhillar
10.5120/21691-4796

Varsha and Rajender Singh Chhillar. Article: Data Hiding using Advanced LSB with RSA Algorithm. International Journal of Computer Applications 122(4):41-45, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Varsha and Rajender Singh Chhillar},
	title = {Article: Data Hiding using Advanced LSB with RSA Algorithm},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {4},
	pages = {41-45},
	month = {July},
	note = {Full text available}
}

Abstract

In this paper, RSA algorithm is used to encrypt the secret message and advanced LSB technique is used to hide the encrypted message. Firstly, the message is encrypted and then encrypted message is being divided in two parts. First part of the encrypted message is xored with odd position and second part with even position of LSB+1. After that the xored encrypted message is being hidden on LSB position.

References

  • Domenico Daniele Bloisi , Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1 , pp. 127-134 .
  • Raphael, A. J. , and Sundaram, V. 2011. Cryptography and Steganography - A Survey. International Journal of Computer Technology Application, 2(3), ISSN: 2229- 6093, pp. 626-630.
  • Adewole Kayode S. and Oladipupo Ayotunde J. "Efficient Data Hiding System using Cryptography and Steganography", International Journal of Applied Information Systems (IJAIS), Volume 4– No. 11, December 2012, pp. 6-11
  • Anil kumar, Rohini Sharma "A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013