Message Concealment Techniques using Image based Steganography

Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into...

Full description

Saved in:
Bibliographic Details
Main Author: Khan, Farhan (author)
Other Authors: Gutub, Adnan Abdul-Aziz (author), unknown (author)
Format: article
Published: 2020
Online Access:https://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513400563826688
author Khan, Farhan
author2 Gutub, Adnan Abdul-Aziz
unknown
author2_role author
author
author_facet Khan, Farhan
Gutub, Adnan Abdul-Aziz
unknown
author_role author
dc.creator.none.fl_str_mv Khan, Farhan
Gutub, Adnan Abdul-Aziz
unknown
dc.date.*.fl_str_mv 2020
dc.format.none.fl_str_mv application/pdf
dc.identifier.none.fl_str_mv https://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf
Message Concealment Techniques using Image based Steganography. IEEEGCC 2007.
dc.language.none.fl_str_mv en
dc.relation.none.fl_str_mv https://eprints.kfupm.edu.sa/id/eprint/1452/
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv Message Concealment Techniques using Image based Steganography
dc.type.none.fl_str_mv Article
PeerReviewed
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison. Index Terms — Image based steganography, Message concealment, LSB insertion, Scytale cipher
eu_rights_str_mv openAccess
format article
id KFUPM_114f523625f4a9dc95a181e95fb524f4
identifier_str_mv Message Concealment Techniques using Image based Steganography. IEEEGCC 2007.
language_invalid_str_mv en
network_acronym_str KFUPM
network_name_str King Fahd University of Petroleum and Minerals
oai_identifier_str oai::1452
publishDate 2020
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Message Concealment Techniques using Image based SteganographyKhan, FarhanGutub, Adnan Abdul-AzizunknownImage based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison. Index Terms — Image based steganography, Message concealment, LSB insertion, Scytale cipherArticlePeerReviewedinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttps://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf Message Concealment Techniques using Image based Steganography. IEEEGCC 2007. enhttps://eprints.kfupm.edu.sa/id/eprint/1452/2020info:eu-repo/semantics/openAccessoai::14522019-11-01T13:27:00Z
spellingShingle Message Concealment Techniques using Image based Steganography
Khan, Farhan
status_str publishedVersion
title Message Concealment Techniques using Image based Steganography
title_full Message Concealment Techniques using Image based Steganography
title_fullStr Message Concealment Techniques using Image based Steganography
title_full_unstemmed Message Concealment Techniques using Image based Steganography
title_short Message Concealment Techniques using Image based Steganography
title_sort Message Concealment Techniques using Image based Steganography
url https://eprints.kfupm.edu.sa/id/eprint/1452/1/d1_s3_p1_1569045947.pdf