作者: Samir Kumar Bandyopadhyay , Sarthak Parui
DOI: 10.5120/1063-1389
关键词:
摘要: ABSTRACT Security of the digital information is becoming primary concern prior to transmitting itself via some media. Information security means protecting and systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this paper, a public key method Steganography proposed under standard cryptographic assumptions. The byte location in LSB which secret bit be embedded found out by receiver apply private reconstruct message following RSA General Terms time hiding based on particular Steganography, Security. Keywords Communication, Security, 1. INTRODUCTION technology that hides within an object, text, picture. It often confused with cryptography, not name but appearance usage. easiest way differentiate two remember steganography conceals only contents also mere existence message. original steganographic applications used “null ciphers” clear text. A null cipher conveys has been encrypted any way, whether it using basic character shifting, substitution advanced modern day encryption algorithm. So, plain view for reason can either detected as being present cannot seen once detected. As common its roots military government ingenuity complexity. science carrier file [1]. general into media like image audio thus transmitted so prevent opponent guessing transmitted. main objective let guess kind apart spatial domain Image file, we, general, invert Least Significant Bit embed Secret [2,3,4]. This known (Least Bit) masking Steganography. algorithm, encrypt find exact Byte embedded. For we employ algorithm generate cipher. Red Green Blue value pixel represented then inverted if one. Likewise, entire thereby send called stego intended recipient. Upon receiving, recipient XOR operation LSBs. Then applying Decryption LSB, get position file. Thus, scatters at -private combination.