An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud

被引:0
作者
Alam, Md. Khorshed [1 ]
Nushrat, Samia [1 ]
Patwary, Md. Amir Hamza [1 ]
Ullah, Ahsan [1 ]
Robin, Kazi Hassan [1 ]
机构
[1] World Univ Bangladesh, Dept Comp Sci & Engn, Dhaka 1230, Bangladesh
来源
ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I | 2023年 / 1797卷
关键词
Steganography; LSB; Cloud computing; TLEA; MLEA;
D O I
10.1007/978-3-031-28180-8_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing allows for a simple, distributed pool of reconfigurable computers with widespread network connectivity. But maintaining data security and privacy is very difficult. In order to guarantee the privacy and security of data in cloud computing, this study developed an efficient and enhanced method that involves concealing data inside pictures. The authors have proposed Multi Level Encryption Algorithm (MLEA) and Two-Level EncryptionAlgorithm (TLEA) and also processed the image in various steps to achieve better security. The objective is to design and develop an image steganography method based on the Least Significant Bit (LSB) technique that can secure the data during sharing or storing. The authors used the LSB technique of image steganography and encrypted data using MLEA and TLEA. The authors compared different methods and proved their research provides better security than the existing ones. This research demonstrates that the proposed method has performance with an average of 19.7814% better than other existing schemes.
引用
收藏
页码:215 / 233
页数:19
相关论文
共 19 条
  • [1] Abbas M.S., 2020, 2020 INT C COMPUTER
  • [2] Secret images transfer in cloud system based on investigating quantum walks in steganography approaches
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Elseuofi, Sherif
    Khalifa, Hany S.
    Alghamdi, Ahmed S.
    Polat, Kemal
    Amin, Mohamed
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 541
  • [3] A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
    Adee, Rose
    Mouratidis, Haralambos
    [J]. SENSORS, 2022, 22 (03)
  • [4] Ahmed O.M., 2017, ACAD J NAWROZ U AJNU, V6
  • [5] [Anonymous], 2016, INT J ENG RES
  • [6] Astuti N. R. D. P., 2020, IOP Conference Series: Materials Science and Engineering, V821, DOI 10.1088/1757-899X/821/1/012041
  • [7] Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography
    Bi, Dexu
    Kadry, Seifedine
    Kumar, Priyan Malarvizhi
    [J]. IET INTELLIGENT TRANSPORT SYSTEMS, 2020, 14 (11) : 1497 - 1506
  • [8] Hadi Saleh H., 2016, AL MUSTANSIRIYAH J S, V27
  • [9] Ismail Abdulkarim A., 2017, INT J SCI ENG RES, V8
  • [10] Karun H.A., 2015, WORLDWIDE J COMPUT S, V4, P786