Cargando…
An efficient and secure technique for image steganography using a hash function
Steganography is a technique in which a person hides information in digital media. The message sent by this technique is so secret that other people cannot even imagine the information’s existence. This article entails developing a mechanism for communicating one-on-one with individuals by concealin...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9748815/ https://www.ncbi.nlm.nih.gov/pubmed/36532801 http://dx.doi.org/10.7717/peerj-cs.1157 |
_version_ | 1784849908951416832 |
---|---|
author | Nezami, Zahid Iqbal Ali, Hamid Asif, Muhammad Aljuaid, Hanan Hamid, Isma Ali, Zulfiqar |
author_facet | Nezami, Zahid Iqbal Ali, Hamid Asif, Muhammad Aljuaid, Hanan Hamid, Isma Ali, Zulfiqar |
author_sort | Nezami, Zahid Iqbal |
collection | PubMed |
description | Steganography is a technique in which a person hides information in digital media. The message sent by this technique is so secret that other people cannot even imagine the information’s existence. This article entails developing a mechanism for communicating one-on-one with individuals by concealing information from the rest of the group. Based on their availability, digital images are the most suited components for use as transmitters when compared to other objects available on the internet. The proposed technique encrypts a message within an image. There are several steganographic techniques for hiding hidden information in photographs, some of which are more difficult than others, and each has its strengths and weaknesses. The encryption mechanism employed may have different requirements depending on the application. For example, certain applications may require complete invisibility of the key information, while others may require the concealment of a larger secret message. In this research, we proposed a technique that converts plain text to ciphertext and encodes it in a picture using up to the four least significant bit (LSB) based on a hash function. The LSBs of the image pixel values are used to substitute pieces of text. Human eyes cannot predict the variation between the initial Image and the resulting image since only the LSBs are modified. The proposed technique is compared with state-of-the-art techniques. The results reveal that the proposed technique outperforms the existing techniques concerning security and efficiency with adequate MSE and PSNR. |
format | Online Article Text |
id | pubmed-9748815 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-97488152022-12-15 An efficient and secure technique for image steganography using a hash function Nezami, Zahid Iqbal Ali, Hamid Asif, Muhammad Aljuaid, Hanan Hamid, Isma Ali, Zulfiqar PeerJ Comput Sci Computer Networks and Communications Steganography is a technique in which a person hides information in digital media. The message sent by this technique is so secret that other people cannot even imagine the information’s existence. This article entails developing a mechanism for communicating one-on-one with individuals by concealing information from the rest of the group. Based on their availability, digital images are the most suited components for use as transmitters when compared to other objects available on the internet. The proposed technique encrypts a message within an image. There are several steganographic techniques for hiding hidden information in photographs, some of which are more difficult than others, and each has its strengths and weaknesses. The encryption mechanism employed may have different requirements depending on the application. For example, certain applications may require complete invisibility of the key information, while others may require the concealment of a larger secret message. In this research, we proposed a technique that converts plain text to ciphertext and encodes it in a picture using up to the four least significant bit (LSB) based on a hash function. The LSBs of the image pixel values are used to substitute pieces of text. Human eyes cannot predict the variation between the initial Image and the resulting image since only the LSBs are modified. The proposed technique is compared with state-of-the-art techniques. The results reveal that the proposed technique outperforms the existing techniques concerning security and efficiency with adequate MSE and PSNR. PeerJ Inc. 2022-11-24 /pmc/articles/PMC9748815/ /pubmed/36532801 http://dx.doi.org/10.7717/peerj-cs.1157 Text en ©2022 Nezami et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Nezami, Zahid Iqbal Ali, Hamid Asif, Muhammad Aljuaid, Hanan Hamid, Isma Ali, Zulfiqar An efficient and secure technique for image steganography using a hash function |
title | An efficient and secure technique for image steganography using a hash function |
title_full | An efficient and secure technique for image steganography using a hash function |
title_fullStr | An efficient and secure technique for image steganography using a hash function |
title_full_unstemmed | An efficient and secure technique for image steganography using a hash function |
title_short | An efficient and secure technique for image steganography using a hash function |
title_sort | efficient and secure technique for image steganography using a hash function |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9748815/ https://www.ncbi.nlm.nih.gov/pubmed/36532801 http://dx.doi.org/10.7717/peerj-cs.1157 |
work_keys_str_mv | AT nezamizahidiqbal anefficientandsecuretechniqueforimagesteganographyusingahashfunction AT alihamid anefficientandsecuretechniqueforimagesteganographyusingahashfunction AT asifmuhammad anefficientandsecuretechniqueforimagesteganographyusingahashfunction AT aljuaidhanan anefficientandsecuretechniqueforimagesteganographyusingahashfunction AT hamidisma anefficientandsecuretechniqueforimagesteganographyusingahashfunction AT alizulfiqar anefficientandsecuretechniqueforimagesteganographyusingahashfunction AT nezamizahidiqbal efficientandsecuretechniqueforimagesteganographyusingahashfunction AT alihamid efficientandsecuretechniqueforimagesteganographyusingahashfunction AT asifmuhammad efficientandsecuretechniqueforimagesteganographyusingahashfunction AT aljuaidhanan efficientandsecuretechniqueforimagesteganographyusingahashfunction AT hamidisma efficientandsecuretechniqueforimagesteganographyusingahashfunction AT alizulfiqar efficientandsecuretechniqueforimagesteganographyusingahashfunction |