The art of message masking is called steganography. Steganography keeps communication from being seen by any other person. In the domain of information concealment within images, numerous steganographic techniques exist. Digital photos stand out as prime candidates due to their widespread availability. This study seeks to develop a secure, high-capacity communication system that ensures private interaction while safeguarding information from the broader context. This study used the four least significant bits for steganography to hide the message in a secure way using a hash function. Before steganography, the message is encrypted using one of the encryption techniques: Caesar cipher or Vigenère cipher. By altering only the least significant bits (LSBs), the changes between the original and stego images remain invisible to the human eye. The proposed method excels in secret data capacity, featuring a high peak signal-to-noise ratio (PSNR) and low mean square error (MSE). This approach offers significant payload capacity and dual-layer security (encryption and steganography).

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10703029PMC
http://dx.doi.org/10.7717/peerj-cs.1606DOI Listing

Publication Analysis

Top Keywords

hash function
8
steganography
6
enhanced payload
4
payload volume
4
volume bits
4
bits image
4
image steganography
4
steganography hash
4
function art
4
art message
4

Similar Publications

Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.

PLoS One

January 2025

Cybersecurity Department, College of Computers, Umm Al-Qura University, Makkah City, Kingdom of Saudi Arabia.

The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives.

View Article and Find Full Text PDF

The objectives of this experiment were to determine the digestible indispensable amino acid score (DIAAS) for eggs cooked in different forms and in traditional egg-bread or egg-hash brown combinations, and to test the hypothesis that DIAAS in eggs is greater than in breads or potatoes. Nine ileal cannulated gilts (average initial body weight: 51.1 ± 6.

View Article and Find Full Text PDF

The increasing popularity and prevalence of Internet of Things (IoT) applications have led to the widespread use of IoT devices. These devices gather information from their environment and send it across a network. IoT devices are unreliable due to their susceptibility to defect that arise intentionally or spontaneously.

View Article and Find Full Text PDF

This paper introduces a novel TRNG architecture that employs a wave converter to generate random outputs from the jitter noise in a customized ring oscillator (RO). Using a current-starved inverter, the proposed RO offers the option of operating three different oscillation frequencies from a single oscillator. To assess its performance, the core TRNG proposed in this work was designed with multiple samples, employing various transistor sizes for 28 nm CMOS processes.

View Article and Find Full Text PDF

Efficient phrase search with reliable verification over encrypted cloud-IoT data.

PeerJ Comput Sci

November 2024

Faculty of Computing and Information Technology, Department of Information Technology, University of Sialkot, Sialkot, Pakistan.

Phrase search encryption enables users to retrieve encrypted data containing a sequence of consecutive keywords without decrypting, which plays an important role in cloud Internet of Things (IoT) systems. However, due to the sequential relationship between keywords in the phrase, phrase search and verification are more difficult than multi-keyword search. Furthermore, verification evidence is generated by the server in existing schemes, and cloud servers are generally considered untrustworthy, so the verification is unreliable.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!