Message Concealment Techniques using Image based Steganography
Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Format: | article |
| Published: |
2020
|
| Online Access: | https://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513400563826688 |
|---|---|
| author | Khan, Farhan |
| author2 | Gutub, Adnan Abdul-Aziz unknown |
| author2_role | author author |
| author_facet | Khan, Farhan Gutub, Adnan Abdul-Aziz unknown |
| author_role | author |
| dc.creator.none.fl_str_mv | Khan, Farhan Gutub, Adnan Abdul-Aziz unknown |
| dc.date.*.fl_str_mv | 2020 |
| dc.format.none.fl_str_mv | application/pdf |
| dc.identifier.none.fl_str_mv | https://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf Message Concealment Techniques using Image based Steganography. IEEEGCC 2007. |
| dc.language.none.fl_str_mv | en |
| dc.relation.none.fl_str_mv | https://eprints.kfupm.edu.sa/id/eprint/1452/ |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.title.none.fl_str_mv | Message Concealment Techniques using Image based Steganography |
| dc.type.none.fl_str_mv | Article PeerReviewed info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison. Index Terms — Image based steganography, Message concealment, LSB insertion, Scytale cipher |
| eu_rights_str_mv | openAccess |
| format | article |
| id | KFUPM_114f523625f4a9dc95a181e95fb524f4 |
| identifier_str_mv | Message Concealment Techniques using Image based Steganography. IEEEGCC 2007. |
| language_invalid_str_mv | en |
| network_acronym_str | KFUPM |
| network_name_str | King Fahd University of Petroleum and Minerals |
| oai_identifier_str | oai::1452 |
| publishDate | 2020 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Message Concealment Techniques using Image based SteganographyKhan, FarhanGutub, Adnan Abdul-AzizunknownImage based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison. Index Terms — Image based steganography, Message concealment, LSB insertion, Scytale cipherArticlePeerReviewedinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttps://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf Message Concealment Techniques using Image based Steganography. IEEEGCC 2007. enhttps://eprints.kfupm.edu.sa/id/eprint/1452/2020info:eu-repo/semantics/openAccessoai::14522019-11-01T13:27:00Z |
| spellingShingle | Message Concealment Techniques using Image based Steganography Khan, Farhan |
| status_str | publishedVersion |
| title | Message Concealment Techniques using Image based Steganography |
| title_full | Message Concealment Techniques using Image based Steganography |
| title_fullStr | Message Concealment Techniques using Image based Steganography |
| title_full_unstemmed | Message Concealment Techniques using Image based Steganography |
| title_short | Message Concealment Techniques using Image based Steganography |
| title_sort | Message Concealment Techniques using Image based Steganography |
| url | https://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf |