Figure 2 - uploaded by Imran Makhdoom
Content may be subject to copyright.
LSB Image Steganography.

LSB Image Steganography.

Source publication
Article
Full-text available
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related crypt...

Contexts in source publication

Context 1
... this method, the LSB of a selected (may be randomly selected) pixel is replaced with one bit of the secret message. The complete process is shown in Figure-2. This technique can embed larger messages without affecting the visual quality of the stego-image as compared to the original cover image. ...
Context 2
... each bit of the secret message is concealed by utilizing a parity bit from each sample. As shown in Figure-12, if the parity bit of a selected region does not match the secret bit to be encoded, then the LSB of one of the samples in the region is inverted [94]. In this way, the sender has more flexibility in encoding the secret bit. ...

Similar publications

Article
Full-text available
Crowdsourcing has long been an effective way for data collection. Despite numerous research efforts devoted to crowdsourcing security, most crowdsourcing platforms in practice are still storing and processing plaintext data, which is vulnerable to in-house attacks. To fill this gap, we envision a full-fledged crowdsourcing platform with end-to-end...

Citations

... These days, steganography may be easily communicated with thanks to computer and network technology. The military, intelligence operations, and online social networks can all benefit from the usage of covert channels to ensure user privacy or coordinate protests and so on [6]. ...
Chapter
Full-text available
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than ever before. By breaking a system security policy, a covert channel can be utilized to leak confidential communications. Undoubtedly, one of the most difficult challenges is still detecting such harmful, unobservable, and covert dangers. Due to the fact that this danger takes advantage of techniques not intended for communication, it is invisible to conventional security solutions. This chapter offers a concise overview of covert channel concept, techniques, classifications, and countermeasures, emphasizing how new technologies are vulnerable to being exploited for initiation of different covert channels and how they offer a rich environment for developing effective but challenging covert channel attacks. It gives a comprehensive review of common covert channel countermeasures with more focus on machine learning detection techniques. Although some research studies have revealed beneficial uses of covert channel, which is natural given that many approaches have a double-edged sword impact, this chapter focuses on covert channels as a security threat that compromise our data and networks.
... The importance of this research lies in that it proposes the use of modern methods to secure instant messages, which include the use of decentralized authentication in sending and receiving messages, the use of the zero-knowledge proof principle, which will be explained during the research, and the use of the Transport Layer Security (TLS) protocol, the instant messaging application to be Secure must achieve the three principles mentioned [2]. ...
Article
Full-text available
This review presents a comprehensive analysis of contemporary scholarship pertaining to instant messaging (IM) user behavior and security protocols. Through meticulous selection, the authors highlight critical studies that illuminate optimized message consumption strategies and delve into the evolving landscape of IM security models. Focusing on the past four years, the review meticulously dissects cutting-edge advancements in this domain. A significant insight emerges: achieving optimal communication security necessitates the synergistic convergence of three fundamental techniques: end-to-end encryption for data confidentiality, decentralized authentication for independent user verification, and zero-knowledge proof for identity obscurity. The review postulates that the simultaneous integration of these elements within the application architecture is paramount for robust privacy and heightened security in the realm of IM.
... Despite these benefits, the paramount challenge of ensuring data security within cloud environments persists. To confront this challenge, the amalgamation of cryptography and steganography has emerged as a robust approach, enhancing the security of sensitive information and mitigating potential threats [15][16][17]. ...
... However, the macroblocks can only use the encrypted ROI as a reference frame for the inter-prediction, which must first be encrypted by the intra-prediction prediction. This is a challenge to ensure that the encryption does not propagate beyond the ROI area and is collected and noise free [14]. In addition, thanks to the non-square coding block supported in VVC, a rectangular region privacy approach was presented that deidentifies faces to achieve more accurate face recognition. ...
... The most recent review paper is authored by Makhdoom, Abolhasan, and Lipman [19] in 2022 provide a coverage of covert communication techniques, including the latest trends, challenges, and future directions. Due to the broad scope of this survey, the discussion on voice communication security is not comprehensive and focused. ...
Article
Full-text available
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in this field can benefit from a review paper with broader evaluation parameters than existing literature and from a coverage of security algorithms for voice communication. This paper provides a comprehensive overview of end-to-end secure voice communication and evaluation of various methods for securing voice transmissions over communication networks. The evaluation parameters include System Throughput Capacity, Transmission Error Rate, Recovered Speech Quality, and Security of the System. The analysis results show that Steganography category is the most popular technique in recent years and the most promising category to implement high system throughput capacity. Modem-based Cryptography category is the most promising category to implement standard security algorithms with low system throughput capacity. Meanwhile, chaotic Cryptography provide suitable cryptography for voice security. Furthermore, the results reveal gaps in proposed solutions, including the evaluation and improvement of speech quality, the need for further development of compatible method to implement standard security algorithms, and the extensive development space for Artificial Intelligent based method.
... Recipients of digitally signed messages make use of the general public key to confirm the authenticity of the acquired message. While the personal and public keys are intrinsically connected, planned measures are taken to ensure their dissimilarity, stopping the publicity of the personal key from the public key [17]. In this context, senders need to percentage their public keys with recipients to enable the verification of message authenticity [18]. ...
Article
Full-text available
Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the security of e-books, data shows that information security issues can cause significant economic losses after three years Although cryptographic methods have been proposed as a solution in of these challenges Focusing on speed and efficiency The shortcomings of traditional encryption methods have been thoroughly examined Although a number of network management techniques assure retention privacy and integrity though, when it comes to encryption. Digital signature algorithms, although effective in detecting unauthorized changes and limiting the scope for copyright protection, do not ensure the confidentiality of shared electronic documents When addressing research gaps addressing this issue, the paper proposes a security framework for electronic documents that combines three important security mechanisms: encryption, digital signatures, and watermark algorithms Dhishu By matching their strengths, constraints are overcome. The combination of encryption and digital signatures is explored as a promising approach to protecting electronic documents, ensuring authenticity and confidentiality Importantly, the need to explore security mechanisms such as digital is highlighted emphasis on handwriting, encryption, and watermarking systems in depth.
... It can be difficult to balance how much information can be concealed in an audio file with the need to remain unaware of the modification when utilizing LSB audio steganography. [18], [19], [20] Steganography's main objective is to securely transmit secret data in an entirely ambiguous manner while avoiding any possibility of introducing any doubt. While it's not to prevent them from learning the secret information, it is to prevent them from acknowledging that it even exists. ...
Article
Full-text available
The need to protect multimedia data security—including audio, video, and text—and the data it contains has persisted, whether in physical or digital form. This is due to the fact that the fabrication and fake of Multimedia data is widespread throughout the world, causing serious costs to people, societies, and the industrial sectors in addition to compromising national security. People are therefore concerned about safeguarding their employment and avoiding these illegal behaviors. To safeguard sensitive data, a variety of strategies including steganography, cryptography, and coding have been used. Steganography is a suitable technique that allows the user to hide a message inside of another message (cover media). The majority of steganography research makes use of cover material, like videos, images, and sounds. Notably, because to the challenges involved in locating embedded bits in an audio recording, audio steganography is typically not prioritized. By altering the least significant bits (LSBs) of audio samples, a technique known as audio steganography (LSB) can be used to conceal information in an audio stream. The least significant bits (LSBs) in a number's binary representation are the least weighted bits and are typically undetectable to the human ear. The audio signal can have a hidden message inserted in it without significantly affecting its perceptual quality by changing or manipulating the LSBs of the audio samples. To incorporate information into an audio, However, because to the slight audio difference, an assailant or other outsider might be able to hear this. To solve this problem, it is important to alter the audio in a way that it cannot be heard by the human ear but may still be understood by other means. This document is a summary of the available research in the field. We start by outlining the fundamentals of audio steganography and how it works. Then, three categories of audio steganography—statistical and random generation; and linguistics—are described. Each class's tactics are examined, with a focus on how a special method is offered for concealing sensitive information. In addition, we survey the existing works in the advancement of strategies and algorithms relevant to audio steganography; our survey, which covers work published from 2016 to 2023, is not exhaustive. This study gathers the present approaches, difficulties, and future directions in this topic with the goal of assisting other researchers .In addition, we survey the existing works in the advancement of strategies and algorithms relevant to audio steganography.
... [18] [19]. 3.The Triple Data Encryption Standard (3DES) The DES technique, which uses three distinct keys to apply the DES process to each block, enhances security but is still used in outdated systems [20] [21]. 4. The Two Fish encryption method, a block cypher replacing the Blowfish algorithm, supports key sizes up to 256 bits while maintaining a fixed block size of 128 bits, offering robust security measures [8]. ...
... This is because two separate keys are used for encryption and decryption [32]. 2. Due to the use of two different keys and the need for key management, Asymmetric key encryption becomes more complex [20].3. Maintaining key security requires asymmetric key encryption in the form of precise keys. ...
... Limitations and effectiveness It can be defined as spread spectrum based, a method of hiding confidential data by spreading it over a wide frequency band, with the ability to analyze its effectiveness and limitations [46]. effectiveness: 1. Due to its wide distribution and difficulty of detection, spectrum-based steganography provides high security, which makes it difficult for attackers to distinguish between coverage media and steganographic data [20]. 2. Steganography is resistant to attacks such as compression, visual inspection, and statistical analysis due to the difficulty of locating hidden data within the cover media [18]. ...
Article
Full-text available
Stage cipher. data protection; encryption; Cyber security ; open encryption; hidden communications; saving information; Encryption algorithms. Hidden Markov models; convolutional neural networks; e-learning; hide pictures; acoustic masking; Video data masking; Hide texts; electronic watermarks; Cryptanalysis. Data and information theory; Measures of the quality of information hiding
... [18] [19]. 3.The Triple Data Encryption Standard (3DES) The DES technique, which uses three distinct keys to apply the DES process to each block, enhances security but is still used in outdated systems [20] [21]. 4. The Two Fish encryption method, a block cypher replacing the Blowfish algorithm, supports key sizes up to 256 bits while maintaining a fixed block size of 128 bits, offering robust security measures [8]. ...
... This is because two separate keys are used for encryption and decryption [32]. 2. Due to the use of two different keys and the need for key management, Asymmetric key encryption becomes more complex [20].3. Maintaining key security requires asymmetric key encryption in the form of precise keys. ...
... Limitations and effectiveness It can be defined as spread spectrum based, a method of hiding confidential data by spreading it over a wide frequency band, with the ability to analyze its effectiveness and limitations [46]. effectiveness: 1. Due to its wide distribution and difficulty of detection, spectrum-based steganography provides high security, which makes it difficult for attackers to distinguish between coverage media and steganographic data [20]. 2. Steganography is resistant to attacks such as compression, visual inspection, and statistical analysis due to the difficulty of locating hidden data within the cover media [18]. ...
... The development of image steganography fills the gap left by the absence of image encryption and offers the necessary technical foundation for covert communication. Steganography is the science and art of concealing secret information so that only the intended recipient is able to recognize its presence [9]. Publicly accessible things conceal sensitive information. ...
Article
Full-text available
Steganography, which is the science of delivering a message between parties in a way that an eavesdropper will not be aware that the message exists, is one of the key disciplines that have a considerable interest in fields. The suggested method seeks to conceal a smaller color image within a larger color image. It utilizes the transform domain throughout the steganography process to increase its resistance to changes and treatments made to the cover image. In order to achieve both complexity security and robustness, the project seeks to implement and utilize two techniques: ant colony optimization and transformation domain approach. The technologies under consideration suggest a Steganography method for digital photographs. It employs Discrete Cosine Transform (DCT) to achieve the same aims in terms of security, transparency and robustness. Additionally, it makes use of Once an Ant Colony Optimization (ACO) to increase robustness against signal processing attacks and imperceptibility in accordance with the human visual system. This work implements ACO for the cover to find the embedding locations on the graph path, and then finds locations to hide information based on threshold method, when looking for places to hide information blocks, DCT uses an intelligent block matching technique between the embedded image and the cover image, and both systems were tested against each other to compare their performance. Six stages make up the proposed secret key steganography system: test, transform, key creation and substitution, ant colony optimization, matching, inverse transform, and key encryption and concealing.