2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015
DOI: 10.1109/iciiecs.2015.7192867
|View full text |Cite
|
Sign up to set email alerts
|

A novel LSB based image steganography with multi-level encryption

Abstract: Steganography is an art of hiding the existence of secret information by embedding it in a cover and hence preventing the unauthorized access of confidential information.This paper proposes a novel approach of encrypting the plain text into cipher text and embedding it into a color image.Encryption is done in two stages, during first stage it is encrypted by Ceaser cipher technique and in the second stage it is encrypted based on chaos theory. The cipher text obtained after encryption is embedded using 3, 3, 2… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Thus, several algorithms have been developed in the past years which make use of multiple keys to generate either the same chaotic map or multiple chaotic maps. This is normally done so as to achieve multi-level encryption and in so doing enhancing the security of the schemes proposed [36], [13], [38], [39].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, several algorithms have been developed in the past years which make use of multiple keys to generate either the same chaotic map or multiple chaotic maps. This is normally done so as to achieve multi-level encryption and in so doing enhancing the security of the schemes proposed [36], [13], [38], [39].…”
Section: Related Workmentioning
confidence: 99%
“…al. [15]propose Novel approach based LSB With Multi-Level Encryption for image steganography where encrypting the plain text into two platforms, during the first platform it is encrypted utilize Ceaser cipher where each letter of plain text is supplanted by another letter at distance specify by given key and in the second platform it is encrypted utilizing chaos theory where the chaotic sequences created from various initial conditions that are free of one another and each part of secret data is encrypted with various initial conditions subsequently all parts are converged into cipher text then the cipher text embedding into a color image using 3, 3, 2 LSB where first 3 bits of ciphers are substitute with( 3 LSB) bits of red channel, next 3 bits of ciphers are substitute with (3 LSB) bits of green channel, and last 2 bits of ciphers are substitute with (2 LSB) bits of blue channel.…”
Section: Li̇terature Surveymentioning
confidence: 99%
“…One way to do this is to take the sensitive or confidential information to be transmitted to perform an encryption process by implementing some cryptographic technique, and then take the encrypted message to perform a mixing process with a cover image using some steganographic technique [8]. Some examples of this are: [9] where the message to be transmitted is encrypted in two stages, the first by Caesar cipher and the second by chaos theory; the encrypted message is embedded in the cover image using the Least Significant Bit (LSB) substitution steganographic algorithm. [10] where the message to be transmitted is encrypted using Advance Encryption Standard (AES) encryption; at the same time, the cover image is preprocessed to resize it and identify the areas where the LSB substitution process was performed using inverse Wavelet Transform and Artificial Neural Networks (ANN).…”
Section: Introductionmentioning
confidence: 99%