Image Steganography Using Hash Function And Compression
An image steganography is a method for concealing any data or secret messages within an image file. In this study, image steganography, which uses a secret key to improve hidden information security while enhancing the LSB approach, is introduced. Before being embedded into a cover image, the messag...
Main Author: | |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/40715/1/CA20158.pdf |
_version_ | 1796996293931827200 |
---|---|
author | Ahmad Sulaiman, Zurkifli |
author_facet | Ahmad Sulaiman, Zurkifli |
author_sort | Ahmad Sulaiman, Zurkifli |
collection | UMP |
description | An image steganography is a method for concealing any data or secret messages within an image file. In this study, image steganography, which uses a secret key to improve hidden information security while enhancing the LSB approach, is introduced. Before being embedded into a cover image, the message image will be compressed using lossy compression algorithms to reduce the size of the image. Prior to and following the embedding of a message image, the cover image is hashed using the hash function. The hash function will be used in the stego image, and the result will be kept in the host image for additional verification throughout the extraction process. The suggested technique uses hash function and lossless compression to illustrate image steganography. |
first_indexed | 2024-04-09T03:52:12Z |
format | Undergraduates Project Papers |
id | UMPir40715 |
institution | Universiti Malaysia Pahang |
language | English |
last_indexed | 2024-04-09T03:52:12Z |
publishDate | 2023 |
record_format | dspace |
spelling | UMPir407152024-03-19T08:02:51Z http://umpir.ump.edu.my/id/eprint/40715/ Image Steganography Using Hash Function And Compression Ahmad Sulaiman, Zurkifli QA75 Electronic computers. Computer science An image steganography is a method for concealing any data or secret messages within an image file. In this study, image steganography, which uses a secret key to improve hidden information security while enhancing the LSB approach, is introduced. Before being embedded into a cover image, the message image will be compressed using lossy compression algorithms to reduce the size of the image. Prior to and following the embedding of a message image, the cover image is hashed using the hash function. The hash function will be used in the stego image, and the result will be kept in the host image for additional verification throughout the extraction process. The suggested technique uses hash function and lossless compression to illustrate image steganography. 2023-01 Undergraduates Project Papers NonPeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/40715/1/CA20158.pdf Ahmad Sulaiman, Zurkifli (2023) Image Steganography Using Hash Function And Compression. Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah. |
spellingShingle | QA75 Electronic computers. Computer science Ahmad Sulaiman, Zurkifli Image Steganography Using Hash Function And Compression |
title | Image Steganography Using Hash Function And Compression |
title_full | Image Steganography Using Hash Function And Compression |
title_fullStr | Image Steganography Using Hash Function And Compression |
title_full_unstemmed | Image Steganography Using Hash Function And Compression |
title_short | Image Steganography Using Hash Function And Compression |
title_sort | image steganography using hash function and compression |
topic | QA75 Electronic computers. Computer science |
url | http://umpir.ump.edu.my/id/eprint/40715/1/CA20158.pdf |
work_keys_str_mv | AT ahmadsulaimanzurkifli imagesteganographyusinghashfunctionandcompression |