Achieving security for images by LSB and MD5

Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant...

Full description

Bibliographic Details
Main Authors: Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos
Format: Article
Language:English
Published: Design for Scientific Renaissance 2012
Subjects:
Online Access:http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf
_version_ 1825646777475268608
author Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
O. Alhussainan, Sondos
author_facet Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
O. Alhussainan, Sondos
author_sort Alahmad, Mohammad
collection IIUM
description Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed.
first_indexed 2024-03-05T23:07:39Z
format Article
id oai:generic.eprints.org:25665
institution International Islamic University Malaysia
language English
last_indexed 2024-03-13T18:57:43Z
publishDate 2012
publisher Design for Scientific Renaissance
record_format dspace
spelling oai:generic.eprints.org:256652012-09-06T06:56:27Z http://irep.iium.edu.my/25665/ Achieving security for images by LSB and MD5 Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha O. Alhussainan, Sondos QA75 Electronic computers. Computer science Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed. Design for Scientific Renaissance 2012-09-03 Article PeerReviewed application/pdf en http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and O. Alhussainan, Sondos (2012) Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3). pp. 127-139. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR/article/view/215
spellingShingle QA75 Electronic computers. Computer science
Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
O. Alhussainan, Sondos
Achieving security for images by LSB and MD5
title Achieving security for images by LSB and MD5
title_full Achieving security for images by LSB and MD5
title_fullStr Achieving security for images by LSB and MD5
title_full_unstemmed Achieving security for images by LSB and MD5
title_short Achieving security for images by LSB and MD5
title_sort achieving security for images by lsb and md5
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf
work_keys_str_mv AT alahmadmohammad achievingsecurityforimagesbylsbandmd5
AT alshaikhliimadfakhritaha achievingsecurityforimagesbylsbandmd5
AT oalhussainansondos achievingsecurityforimagesbylsbandmd5