Software implementation of image steganography based on LSB algorithm with Caesar’s cipher
Abstract
The purpose of this work is to conduct a study of computer steganography methods and the implementation of image steganography using the LSD algorithm and the Caesar cipher. The development of global computer networks allows fast and efficient transfer of electronic documents, but at the same time there is a risk of illegal copying and distribution of materials. Confidentiality of important information is an extremely responsible matter. Therefore, there is a need to develop methods and software tools for hiding information in various types of files, in particular images. Steganography is a mechanism for hiding messages in cloaking objects such as images, audio, text, video, and network protocol so that the hidden message cannot be detected by the naked eye or attackers
References
2. Sahu, M.; Padhy, N.; Gantayat, S.S.; Sahu, A.K. Local binary pattern-based reversible data hiding. CAAI Trans. Intell. Technol. 2022, 7, 695–709. [Google Scholar] [CrossRef]
3. Mansour RF, Abdelrahim EM (2019) An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidimens Syst Signal Process 30(2):791–814.
4. Chi-square [Electronic resource] – Resource access mode:
https://www.investopedia.com/terms/c/chi-square-statistic.asp (date of access: 26.11.2023).
5. Pelosi, M.; Easttom, C. Identification of LSB image steganography using cover image comparisons. J. Digit. Forensics Secur. Law 2021, 15, 6. [Google Scholar]
Abstract views: 0 PDF Downloads: 0