2017
DOI: 10.5566/ias.1482
|View full text |Cite
|
Sign up to set email alerts
|

Clsm: Couple Layered Security Model a High-Capacity Data Hiding Scheme Using With Steganography

Abstract: Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM -Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…In the LSB substitution two-bit method, the data hiding process is performed by replacing the least significant two bits of the colored cover image. Although up to six-bit data is hidden in one pixel of the colored cover image, four-bit data are usually hidden in the literature studies using this method [21,[41][42]. The red (R), green (G), and blue (B) color channels can hide maximum six-bit data by using last two-bit data, or four-bit data are hidden using different versions as R2G2, G2B2, R2B2, R2G1B1 etc.…”
Section: Figure 3 Block Diagram Of Lsb Substitution One-bitmentioning
confidence: 99%
See 1 more Smart Citation
“…In the LSB substitution two-bit method, the data hiding process is performed by replacing the least significant two bits of the colored cover image. Although up to six-bit data is hidden in one pixel of the colored cover image, four-bit data are usually hidden in the literature studies using this method [21,[41][42]. The red (R), green (G), and blue (B) color channels can hide maximum six-bit data by using last two-bit data, or four-bit data are hidden using different versions as R2G2, G2B2, R2B2, R2G1B1 etc.…”
Section: Figure 3 Block Diagram Of Lsb Substitution One-bitmentioning
confidence: 99%
“…The first nine-bit (010000010) of the secret data is hidden on the first two adjacent pixels of the apples cover image in the block diagram. The first two adjacent pixel values of the cover image are RGB (42,57,24) and RGB (41,56,25), whereas the first two adjacent pixel values that occur in the stego image are RGB (43,56,24) and RGB (41,56,26). As seen from the example in the block diagram, although the nine-bit part of the secret data is hidden in the apple cover image, stego image has negligible change that cannot be perceived by the human eye.…”
Section: Data Hiding Process Of Pvdmentioning
confidence: 99%
“…Kocak proposed a Couple Layered Security Model (CLSM) to hide high-capacity data using two-bit LSB method [19]. Aydoğan et al presented a LSB-based method to hide the data with minimal changes to medical images [20].…”
Section: Introductionmentioning
confidence: 99%