We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Data Hiding using Advanced LSB with RSA Algorithm

by Varsha, Rajender Singh Chhillar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 4
Year of Publication: 2015
Authors: Varsha, Rajender Singh Chhillar
10.5120/21691-4796

Varsha, Rajender Singh Chhillar . Data Hiding using Advanced LSB with RSA Algorithm. International Journal of Computer Applications. 122, 4 ( July 2015), 41-45. DOI=10.5120/21691-4796

@article{ 10.5120/21691-4796,
author = { Varsha, Rajender Singh Chhillar },
title = { Data Hiding using Advanced LSB with RSA Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 4 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number4/21691-4796/ },
doi = { 10.5120/21691-4796 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:43.839189+05:30
%A Varsha
%A Rajender Singh Chhillar
%T Data Hiding using Advanced LSB with RSA Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 4
%P 41-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, RSA algorithm is used to encrypt the secret message and advanced LSB technique is used to hide the encrypted message. Firstly, the message is encrypted and then encrypted message is being divided in two parts. First part of the encrypted message is xored with odd position and second part with even position of LSB+1. After that the xored encrypted message is being hidden on LSB position.

References
  1. Domenico Daniele Bloisi , Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1 , pp. 127-134 .
  2. Raphael, A. J. , and Sundaram, V. 2011. Cryptography and Steganography - A Survey. International Journal of Computer Technology Application, 2(3), ISSN: 2229- 6093, pp. 626-630.
  3. Adewole Kayode S. and Oladipupo Ayotunde J. "Efficient Data Hiding System using Cryptography and Steganography", International Journal of Applied Information Systems (IJAIS), Volume 4– No. 11, December 2012, pp. 6-11
  4. Anil kumar, Rohini Sharma "A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013
Index Terms

Computer Science
Information Sciences

Keywords

Steganography cryptography RSA algorithm Least Significant Bit