UCSY's Research Repository

Customized and Secure Image Steganography through Least Significant Bit Replacement

Show simple item record

dc.contributor.author Latt, Kyaw Zin
dc.contributor.author Ko, Lin Min
dc.date.accessioned 2019-07-22T07:41:30Z
dc.date.available 2019-07-22T07:41:30Z
dc.date.issued 2010-12-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/1155
dc.description.abstract Steganography is the process of hiding a secret message within a larger one in such a way that someone can not know the presence or contents of hidden message. The purpose of Steganography is to maintain secret communication between two parties. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key. The carrier can be a painting, a digital image, an mp3 and even a TCP/IP packet among other things. It is the object that will „carry‟ hidden message. A key is used to decode/decipher/discover hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. This system presents how Steganography is used in a modern context while a practical understanding of what Steganography is providing how to accomplish it. This paper describes the design of a data hiding structure using Steganography. In this paper, we focus on the use of Steganography within digital images using Least Significant Bit (LSB) substitution. en_US
dc.language.iso en en_US
dc.publisher Fifth Local Conference on Parallel and Soft Computing en_US
dc.subject Steganography en_US
dc.subject LSB en_US
dc.subject stego en_US
dc.subject stegano en_US
dc.title Customized and Secure Image Steganography through Least Significant Bit Replacement en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics