2019
DOI: 10.1088/1757-899x/518/5/052002
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of Image Steganography Scheme Based on LSB Value with Two Control Random Parameters and Multi-level Encryption

Abstract: Recently, steganography has played an important part in the field of communication, especially in image steganography. The major points of image steganography are the image quality (imperceptibility) of the stego image and the security of the system towards stopping the recoverability of the secret data. A new steganography scheme based on two control random parameters and multi-level encryption can address the security challenge while the P_Even/P_Odd classification can ensure the imperceptibility of the steg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…Multi-Level Encryption (MLE) is used for proposed algorithm having different encryption operations to improve the security and give hardness to the attackers [57][58]. It is used on secret data before embedding to the cover object or image for increasing security using some XOR operation to make the message unrecoverable for any assailants.…”
Section: Table 2 Notations Used In Proposed Algorithmmentioning
confidence: 99%
“…Multi-Level Encryption (MLE) is used for proposed algorithm having different encryption operations to improve the security and give hardness to the attackers [57][58]. It is used on secret data before embedding to the cover object or image for increasing security using some XOR operation to make the message unrecoverable for any assailants.…”
Section: Table 2 Notations Used In Proposed Algorithmmentioning
confidence: 99%
“…Furthermore, this technique is based on deep data hiding and extraction algorithm working on a multi-channel (MCDHEA). This algorithm is the extended version of the old techniques such as multi-level steganography (MLS) ( Mahdi et al, 2019 ), deep data hiding and extraction algorithm (DHEA) ( Elshare & EL-Emam, 2018 ), and improved deep data hiding and extraction (IDHEA) ( Ahmad, El-Emam & AL-Azawi, 2021 ). The proposed algorithm (MCDHEA) has been implemented in two phases.…”
Section: The Suggested Hiding and Extraction Algorithmmentioning
confidence: 99%
“…In the pursuit of heightened data security, researchers have advocated for the use of extensive keys within various cryptographic algorithms. While an enlarged key size is synonymous with fortified data protection, the complexity inherent in key management cannot be overlooked [6]. The RSA algorithm, a cornerstone in public-key cryptography, was introduced to the public domain in 1978 and represents a significant advancement in the field [7].…”
Section: Introductionmentioning
confidence: 99%