2017
DOI: 10.3844/jmssp.2017.127.138
|View full text |Cite
|
Sign up to set email alerts
|

Randomized Pixel Selection for Enhancing LSB Algorithm Security against Brute-Force Attack

Abstract: Steganography is the science of concealing a secret message by embedding it into innocent carriers such as text, audio, images, etc. It plays a crucial role in a broad range of security applications such as securing message exchange, user authentication and copyrighting. One of the most effortless and widely-used techniques is the age-old Least Significant Bits (LSB) algorithm, which can be implemented in both transformative and spatial domains. The advantage of this technique is that it can be used with any f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Thus the final password would be generated. This final password ensures high-level security [13]. For e.g., let time and date be 9:13:56 AM and 25/12/2017 respectively.…”
Section: Research Methods 21 Step 1: Password Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus the final password would be generated. This final password ensures high-level security [13]. For e.g., let time and date be 9:13:56 AM and 25/12/2017 respectively.…”
Section: Research Methods 21 Step 1: Password Generationmentioning
confidence: 99%
“…8, No. 3, September 2020: 525 -531 526 [6] compared to existing LSB [7,8,9] technique. Here, system date and time is taken to generate the password for each instance and then positions of the characters of the password are randomly changed to finalize the ultimate password which is chosen as confidential information.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…The factors that affected the steganography techniques which may make some difficulties of these techniques are the followings [8], [9]:  Invisibility: gives an indication of how similar the stego-picture for the original image [10], [11].  Payload/capacity: it gives a limited amount of data to be hidden in the spread media [12].…”
Section: Introductionmentioning
confidence: 99%