Cargando…

An efficient and secure technique for image steganography using a hash function

Steganography is a technique in which a person hides information in digital media. The message sent by this technique is so secret that other people cannot even imagine the information’s existence. This article entails developing a mechanism for communicating one-on-one with individuals by concealin...

Descripción completa

Detalles Bibliográficos
Autores principales: Nezami, Zahid Iqbal, Ali, Hamid, Asif, Muhammad, Aljuaid, Hanan, Hamid, Isma, Ali, Zulfiqar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9748815/
https://www.ncbi.nlm.nih.gov/pubmed/36532801
http://dx.doi.org/10.7717/peerj-cs.1157
_version_ 1784849908951416832
author Nezami, Zahid Iqbal
Ali, Hamid
Asif, Muhammad
Aljuaid, Hanan
Hamid, Isma
Ali, Zulfiqar
author_facet Nezami, Zahid Iqbal
Ali, Hamid
Asif, Muhammad
Aljuaid, Hanan
Hamid, Isma
Ali, Zulfiqar
author_sort Nezami, Zahid Iqbal
collection PubMed
description Steganography is a technique in which a person hides information in digital media. The message sent by this technique is so secret that other people cannot even imagine the information’s existence. This article entails developing a mechanism for communicating one-on-one with individuals by concealing information from the rest of the group. Based on their availability, digital images are the most suited components for use as transmitters when compared to other objects available on the internet. The proposed technique encrypts a message within an image. There are several steganographic techniques for hiding hidden information in photographs, some of which are more difficult than others, and each has its strengths and weaknesses. The encryption mechanism employed may have different requirements depending on the application. For example, certain applications may require complete invisibility of the key information, while others may require the concealment of a larger secret message. In this research, we proposed a technique that converts plain text to ciphertext and encodes it in a picture using up to the four least significant bit (LSB) based on a hash function. The LSBs of the image pixel values are used to substitute pieces of text. Human eyes cannot predict the variation between the initial Image and the resulting image since only the LSBs are modified. The proposed technique is compared with state-of-the-art techniques. The results reveal that the proposed technique outperforms the existing techniques concerning security and efficiency with adequate MSE and PSNR.
format Online
Article
Text
id pubmed-9748815
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-97488152022-12-15 An efficient and secure technique for image steganography using a hash function Nezami, Zahid Iqbal Ali, Hamid Asif, Muhammad Aljuaid, Hanan Hamid, Isma Ali, Zulfiqar PeerJ Comput Sci Computer Networks and Communications Steganography is a technique in which a person hides information in digital media. The message sent by this technique is so secret that other people cannot even imagine the information’s existence. This article entails developing a mechanism for communicating one-on-one with individuals by concealing information from the rest of the group. Based on their availability, digital images are the most suited components for use as transmitters when compared to other objects available on the internet. The proposed technique encrypts a message within an image. There are several steganographic techniques for hiding hidden information in photographs, some of which are more difficult than others, and each has its strengths and weaknesses. The encryption mechanism employed may have different requirements depending on the application. For example, certain applications may require complete invisibility of the key information, while others may require the concealment of a larger secret message. In this research, we proposed a technique that converts plain text to ciphertext and encodes it in a picture using up to the four least significant bit (LSB) based on a hash function. The LSBs of the image pixel values are used to substitute pieces of text. Human eyes cannot predict the variation between the initial Image and the resulting image since only the LSBs are modified. The proposed technique is compared with state-of-the-art techniques. The results reveal that the proposed technique outperforms the existing techniques concerning security and efficiency with adequate MSE and PSNR. PeerJ Inc. 2022-11-24 /pmc/articles/PMC9748815/ /pubmed/36532801 http://dx.doi.org/10.7717/peerj-cs.1157 Text en ©2022 Nezami et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Nezami, Zahid Iqbal
Ali, Hamid
Asif, Muhammad
Aljuaid, Hanan
Hamid, Isma
Ali, Zulfiqar
An efficient and secure technique for image steganography using a hash function
title An efficient and secure technique for image steganography using a hash function
title_full An efficient and secure technique for image steganography using a hash function
title_fullStr An efficient and secure technique for image steganography using a hash function
title_full_unstemmed An efficient and secure technique for image steganography using a hash function
title_short An efficient and secure technique for image steganography using a hash function
title_sort efficient and secure technique for image steganography using a hash function
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9748815/
https://www.ncbi.nlm.nih.gov/pubmed/36532801
http://dx.doi.org/10.7717/peerj-cs.1157
work_keys_str_mv AT nezamizahidiqbal anefficientandsecuretechniqueforimagesteganographyusingahashfunction
AT alihamid anefficientandsecuretechniqueforimagesteganographyusingahashfunction
AT asifmuhammad anefficientandsecuretechniqueforimagesteganographyusingahashfunction
AT aljuaidhanan anefficientandsecuretechniqueforimagesteganographyusingahashfunction
AT hamidisma anefficientandsecuretechniqueforimagesteganographyusingahashfunction
AT alizulfiqar anefficientandsecuretechniqueforimagesteganographyusingahashfunction
AT nezamizahidiqbal efficientandsecuretechniqueforimagesteganographyusingahashfunction
AT alihamid efficientandsecuretechniqueforimagesteganographyusingahashfunction
AT asifmuhammad efficientandsecuretechniqueforimagesteganographyusingahashfunction
AT aljuaidhanan efficientandsecuretechniqueforimagesteganographyusingahashfunction
AT hamidisma efficientandsecuretechniqueforimagesteganographyusingahashfunction
AT alizulfiqar efficientandsecuretechniqueforimagesteganographyusingahashfunction