Software implementation of image steganography based on LSB algorithm with Caesar’s cipher

Keywords: steganography, image steganography, information security, algorithm

Abstract

The purpose of this work is to conduct a study of computer steganography methods and the implementation of image steganography using the LSD algorithm and the Caesar cipher. The development of global computer networks allows fast and efficient transfer of electronic documents, but at the same time there is a risk of illegal copying and distribution of materials. Confidentiality of important information is an extremely responsible matter. Therefore, there is a need to develop methods and software tools for hiding information in various types of files, in particular images. Steganography is a mechanism for hiding messages in cloaking objects such as images, audio, text, video, and network protocol so that the hidden message cannot be detected by the naked eye or attackers

References

Hashim, M.M.; Rahim MS, M.; Johi, F.A.; Taha, M.S.; Hamad, H.S. Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. Int. J. Eng. Technol. 2018, 7, 3505–3514. [Google Scholar]
2. Sahu, M.; Padhy, N.; Gantayat, S.S.; Sahu, A.K. Local binary pattern-based reversible data hiding. CAAI Trans. Intell. Technol. 2022, 7, 695–709. [Google Scholar] [CrossRef]
3. Mansour RF, Abdelrahim EM (2019) An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidimens Syst Signal Process 30(2):791–814.
4. Chi-square [Electronic resource] – Resource access mode:
https://www.investopedia.com/terms/c/chi-square-statistic.asp (date of access: 26.11.2023).
5. Pelosi, M.; Easttom, C. Identification of LSB image steganography using cover image comparisons. J. Digit. Forensics Secur. Law 2021, 15, 6. [Google Scholar]

Abstract views: 0
PDF Downloads: 0
Published
2023-12-16
How to Cite
StrukІ., & Yurchak, I. (2023). Software implementation of image steganography based on LSB algorithm with Caesar’s cipher. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (53), 63-71. https://doi.org/10.36910/6775-2524-0560-2023-53-10
Section
Computer science and computer engineering