Yuan, Xi and Cai, Peng StegoCrypt: Combining steganography and cryptography., 2019 . In IEEE. (Submitted) [Conference paper]
Preview |
Text
Conference-template-A4.pdf Download (423kB) | Preview |
English abstract
The utilization of pictures to conceal data is a highlight which leaves little uncertainty in a watcher's psyche. Utilizing any medium to shroud data alludes to a strategy called steganography. When we utilize a picture as a medium then that technique is called picture steganography. The most renowned technique to now is the Least Significant Bit Algorithm (LSB). In that technique, the least critical piece of every pixel is taken and data is covered up in that. This anyway is effectively brittle. Consequently an option and increasingly secure arrangement is given. First the information is scrambled utilizing the Blowfish calculation. Next an inventive technique is displayed. This encoded square is broken down to 'n' littler squares and 'n' pictures are picked indiscriminately what's more, each picture is made to conceal a square of the encoded information. To keep up the right arrangement of hinders a hash table is kept up. This is then encoded utilizing LSB to another picture called the hashing picture. This hashing picture is sent alongside the 'n' different pictures. To separate the information out, first the hash picture is acquired and utilizing this the scrambled square is reassembled and after that unique information is gotten by unscrambling.The utilization of pictures to conceal data is a highlight which leaves little uncertainty in a watcher's psyche. Utilizing any medium to shroud data alludes to a strategy called steganography. When we utilize a picture as a medium then that technique is called picture steganography. The most renowned technique to now is the Least Significant Bit Algorithm (LSB). In that technique, the least critical piece of every pixel is taken and data is covered up in that. This anyway is effectively brittle. Consequently an option and increasingly secure arrangement is given. First the information is scrambled utilizing the Blowfish calculation. Next an inventive technique is displayed. This encoded square is broken down to 'n' littler squares and 'n' pictures are picked indiscriminately what's more, each picture is made to conceal a square of the encoded information. To keep up the right arrangement of hinders a hash table is kept up. This is then encoded utilizing LSB to another picture called the hashing picture. This hashing picture is sent alongside the 'n' different pictures. To separate the information out, first the hash picture is acquired and utilizing this the scrambled square is reassembled and after that unique information is gotten by unscrambling.
Item type: | Conference paper |
---|---|
Keywords: | steganography, cryptography |
Subjects: | A. Theoretical and general aspects of libraries and information. |
Depositing user: | Mr Eugene Fox |
Date deposited: | 09 Oct 2019 00:31 |
Last modified: | 09 Oct 2019 00:31 |
URI: | http://hdl.handle.net/10760/39047 |
References
Downloads
Downloads per month over past year
Actions (login required)
View Item |