Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Least Significant Bit

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Data hiding and extraction using pseudo-random generation and cover image replication Pages 993-1010 Right click to download the paper Download PDF

Authors: Mohammad K. Al-Laham, Nameer N. El-Emam, Kefaya Qaddoum

DOI: 10.5267/j.ijdns.2024.10.005

Keywords: Steganography, Multi cover image, Least Significant Bit, Pseudo-Random Generation, Load balance

Abstract:
This paper introduces a new algorithm in Steganography for concealing secret messages or images within digital images. The algorithm is designed to produce stego images that can be transmitted to recipients without detection by potential attackers, thereby ensuring secure communication channels. The proposed algorithm employs a multi-level randomization technique to embed data within randomly selected cover images, with each byte of the secret image distributed across multiple cover images. This approach contrasts with conventional methods that hide data within a single cover image. Moreover, the algorithm incorporates a load-balancing priority system, a critical feature that ensures uniform stego image quality across the dataset. This strategic approach minimizes variations in Peak-Signal-to-Noise-Ratio (PSNR) values, contributing to consistent performance during data hiding and extraction processes and enhancing communication security. The security and recoverability of the secret image are further improved by a simplified Cipher key system based on SHA-256, which facilitates pseudo-random number generation. This system ensures that the hidden image can be recovered at the receiver's end, even in the face of potential attacks. Experimental results demonstrate comparable PSNR quality to existing methods, particularly when utilizing equal total resolution to deep hiding algorithms. Notably, the proposed algorithm offers an alternative to encryption by leveraging randomization, thereby complicating data extraction for potential attackers by distributing data across multiple images with a randomly generated cipher key.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 4 | Views: 156 | Reviews: 0

 

® 2010-2026 GrowingScience.Com