Abstract

Forming a logical balance between the quality of the file and the scope of data that can be conveyed is the test of steganographic techniques to form such a balance. On top of that, the facts that cannot be covered up are the robustness of the method and security of the vague data. An insertion method which delivers a high level of visual quality and a huge amount of volume for the obscured data is called the Least Significant Bit (LSB), but the concealed message is poorly secured through this technique. In the recommended approach, the Vigenere encryption techniques initially used to encode the secret data to assure the safety of the concealed message. Later, the data is contracted through the Huffman coding method in order to decrease the occupational volume of the classified data. Then, each bit stream of the data is dispersed out onto the image to enhance the robustness of the technique by using the expanded knight tour algorithm. The outcomes show that apart from enhancing the visual quality of the stego image, the recommended technique enhances the safety and payload capacity issues of the simple LSB technique.

Highlights

  • Critical concerns in the digital world today are data security and safety of personal information

  • To have a precise observation of the fulfillment of our method, we examined the results in terms of Simple Least Significant Bit (LSB) Enhanced LSB

  • Capacity: The maximum payload capacity for the Simple LSB approach is the situation that the least significant bit of all the image pixels are used for the embedding

Read more

Summary

INTRODUCTION

Critical concerns in the digital world today are data security and safety of personal information. LSB algorithm is not extremely safe against statistical assaults and the security of concealed data is not definite regardless of having the biggest payload and high levels of quality and imperceptibility. To put it in another way, it would be quite simple to locate the original message by retrieving the data from the cover image (Chan and Cheng, 2004). In the receiver the reverse of this method must be done to retrieve the payload

PROPOSED METHODOLOGY
EXPERIMENTAL RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.