The art of message masking is called steganography. Steganography keeps communication from being seen by any other person. In the domain of information concealment within images, numerous steganographic techniques exist. Digital photos stand out as prime candidates due to their widespread availability. This study seeks to develop a secure, high-capacity communication system that ensures private interaction while safeguarding information from the broader context. This study used the four least significant bits for steganography to hide the message in a secure way using a hash function. Before steganography, the message is encrypted using one of the encryption techniques: Caesar cipher or Vigenère cipher. By altering only the least significant bits (LSBs), the changes between the original and stego images remain invisible to the human eye. The proposed method excels in secret data capacity, featuring a high peak signal-to-noise ratio (PSNR) and low mean square error (MSE). This approach offers significant payload capacity and dual-layer security (encryption and steganography).
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10703029 | PMC |
http://dx.doi.org/10.7717/peerj-cs.1606 | DOI Listing |
PLoS One
January 2025
Cybersecurity Department, College of Computers, Umm Al-Qura University, Makkah City, Kingdom of Saudi Arabia.
The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives.
View Article and Find Full Text PDFJ Nutr Sci
December 2024
Division of Nutritional Sciences, University of Illinois, Urbana, IL, USA.
The objectives of this experiment were to determine the digestible indispensable amino acid score (DIAAS) for eggs cooked in different forms and in traditional egg-bread or egg-hash brown combinations, and to test the hypothesis that DIAAS in eggs is greater than in breads or potatoes. Nine ileal cannulated gilts (average initial body weight: 51.1 ± 6.
View Article and Find Full Text PDFPLoS One
December 2024
School of Electronics Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India.
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to the widespread use of IoT devices. These devices gather information from their environment and send it across a network. IoT devices are unreliable due to their susceptibility to defect that arise intentionally or spontaneously.
View Article and Find Full Text PDFSensors (Basel)
November 2024
School of Electrical Engineering, Chungbuk National University, Cheongju 28644, Republic of Korea.
This paper introduces a novel TRNG architecture that employs a wave converter to generate random outputs from the jitter noise in a customized ring oscillator (RO). Using a current-starved inverter, the proposed RO offers the option of operating three different oscillation frequencies from a single oscillator. To assess its performance, the core TRNG proposed in this work was designed with multiple samples, employing various transistor sizes for 28 nm CMOS processes.
View Article and Find Full Text PDFPeerJ Comput Sci
November 2024
Faculty of Computing and Information Technology, Department of Information Technology, University of Sialkot, Sialkot, Pakistan.
Phrase search encryption enables users to retrieve encrypted data containing a sequence of consecutive keywords without decrypting, which plays an important role in cloud Internet of Things (IoT) systems. However, due to the sequential relationship between keywords in the phrase, phrase search and verification are more difficult than multi-keyword search. Furthermore, verification evidence is generated by the server in existing schemes, and cloud servers are generally considered untrustworthy, so the verification is unreliable.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!