New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check
Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload cap...
Saved in:
| Published in | Sadhana (Bangalore) Vol. 43; no. 5; pp. 1 - 14 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
New Delhi
Springer India
01.05.2018
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0256-2499 0973-7677 |
| DOI | 10.1007/s12046-018-0848-4 |
Cover
| Abstract | Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload capacity, posses integrity check and security with cryptography at the same time. Proposed work supports many different formats as payload. In the proposed method, the codeword is firstly formed with secret data and its CRC-32 checksum, then the codeword is compressed by Gzip just before encrypting it by AES, and it is finally added to encrypted header information for further process and then embedded into the cover image. Embedding the encrypted data and header information process utilizes Fisher-Yates Shuffle algorithm for selecting next pixel location. To hide one byte, different LSB (least significant bits) of all colour channels of the selected pixel is exploited. In order to evaluate the proposed method, comparative performance tests are carried out against different spatial image steganographic techniques using some of the well-known image quality metrics. For security analysis, histogram, enhanced LSB and Chi-square analyses are carried out. The results indicate that with the proposed method has an improved payload capacity, security and integrity check for common problems of simple LSB method. Moreover, it has been shown that the proposed method increases the visual quality of the stego image when compared to other studied methods, and makes the secret message difficult to be discovered. |
|---|---|
| AbstractList | Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload capacity, posses integrity check and security with cryptography at the same time. Proposed work supports many different formats as payload. In the proposed method, the codeword is firstly formed with secret data and its CRC-32 checksum, then the codeword is compressed by Gzip just before encrypting it by AES, and it is finally added to encrypted header information for further process and then embedded into the cover image. Embedding the encrypted data and header information process utilizes Fisher-Yates Shuffle algorithm for selecting next pixel location. To hide one byte, different LSB (least significant bits) of all colour channels of the selected pixel is exploited. In order to evaluate the proposed method, comparative performance tests are carried out against different spatial image steganographic techniques using some of the well-known image quality metrics. For security analysis, histogram, enhanced LSB and Chi-square analyses are carried out. The results indicate that with the proposed method has an improved payload capacity, security and integrity check for common problems of simple LSB method. Moreover, it has been shown that the proposed method increases the visual quality of the stego image when compared to other studied methods, and makes the secret message difficult to be discovered. |
| ArticleNumber | 68 |
| Author | Elmasry, Wisam Cem kasapbaşi, Mustafa |
| Author_xml | – sequence: 1 givenname: Mustafa surname: Cem kasapbaşi fullname: Cem kasapbaşi, Mustafa email: mckasapbasi@ticaret.edu.tr organization: Department of Computer Engineering, Istanbul Commerce University – sequence: 2 givenname: Wisam surname: Elmasry fullname: Elmasry, Wisam organization: Department of Computer Engineering, Istanbul Commerce University |
| BookMark | eNp9kEFv1DAQhS1UJNrCD-BmiSumYycbO0eoKFRawaHt2Zo4403K1g62Vyjiz9dlkZCQ4OSx5n1vZt4ZOwkxEGOvJbyTAPoiSwVtJ0AaAaY1on3GTqHXjdCd1ie1VptOqLbvX7CznO8BlAbTnLKfX-gH3958EANmGrmL-3hIfH7AHfFcaIch7hIu08ofqExx5CVyChMGR7xMxMn72c0U3MrnwBdc9xGrDS7o5rK-5ZncIdWKYxirojr--rmJ3LeX7LnHfaZXv99zdnf18fbys9h-_XR9-X4rXCO7IkZllGsbaXoYxwYa8HLjfQ_YDh2aDcCga8sMEo3aSHKd91Qb46BbZ3qDzTl7c_RdUvx-oFzsfT0y1JFWQSN1p7reVJU-qlyKOSfytl6AZY6hJJz3VoJ9Stoek7Y1afuUtG0rKf8il1QTTOt_GXVkctWGHaU_O_0begQl4ZOF |
| CitedBy_id | crossref_primary_10_1117_1_JEI_31_3_033021 crossref_primary_10_1007_s11042_023_16975_6 crossref_primary_10_4018_IJISP_2022010118 crossref_primary_10_1109_ACCESS_2023_3237393 crossref_primary_10_1515_jisys_2018_0225 crossref_primary_10_3390_e23030273 crossref_primary_10_1155_2022_1870136 crossref_primary_10_3390_sym14071325 crossref_primary_10_3390_s23063288 crossref_primary_10_1080_15325008_2024_2346830 crossref_primary_10_1007_s11042_020_09162_4 crossref_primary_10_1051_bioconf_20249700069 crossref_primary_10_1109_ACCESS_2019_2946807 crossref_primary_10_1016_j_epsr_2022_107834 crossref_primary_10_3390_jsan11040066 crossref_primary_10_1007_s13369_022_07030_x |
| Cites_doi | 10.1109/TIFS.2010.2041812 10.1109/5.771065 10.1049/ip-vis:20059022 10.1109/RAECS.2014.6799604 10.1016/S0167-8655(02)00402-6 10.1109/JRPROC.1961.287814 10.1016/j.patcog.2003.08.007 10.14445/22312803/IJCTT-V15P122 10.1016/j.jisa.2016.07.001 10.1016/j.sigpro.2009.08.010 10.1109/CISP.2010.5646724 10.1145/1947940.1948038 10.1109/MWSCAS.2003.1562601 10.1007/978-81-322-2538-6_53 10.1109/TMM.2004.827493 10.1109/COMST.2014.2350994 10.1109/93.959097 10.1145/2905055.2905294 |
| ContentType | Journal Article |
| Copyright | Indian Academy of Sciences 2018 Copyright Springer Science & Business Media 2018 |
| Copyright_xml | – notice: Indian Academy of Sciences 2018 – notice: Copyright Springer Science & Business Media 2018 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s12046-018-0848-4 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Sciences (General) |
| EISSN | 0973-7677 |
| EndPage | 14 |
| ExternalDocumentID | 10_1007_s12046_018_0848_4 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C -~X .86 .VR 06D 0R~ 0VY 123 1N0 203 28- 29P 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2WC 2~H 30V 4.4 406 408 40D 40E 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDBF ABDZT ABECU ABFTV ABHQN ABJNI ABJOX ABKCH ABLLD ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACUHS ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFEXP AFGCZ AFLOW AFQWF AFWTZ AFZKB AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCEE ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA C1A CAG COF CS3 CSCUP DDRTE DNIVK DPUIP E3Z EAD EAP EBLON EBS EIOEI EJD EOJEC ESBYG ESX FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GROUPED_DOAJ H13 HG5 HG6 HMJXF HRMNR HVGLF HZ~ I-F IJ- IKXTQ IWAJR IXD I~X I~Z J-C J0Z JBSCW JZLTJ KOV KQ8 LLZTM M4Y MA- MK~ N2Q NDZJH NF0 NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OBODZ OK1 P19 P2P P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RAB RHV RIG RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TR2 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 XSB YLTOR Z45 Z7R Z7S Z7X Z7Z Z83 Z86 Z88 Z8M Z8N Z8R Z8T Z8W Z92 ZMTXR _50 ~8M ~A9 ~EX AAPKM AAYXX ABDBE ABRTQ ADHKG AFDZB AFOHR AGQPQ AHPBZ ATHPR CITATION OVT |
| ID | FETCH-LOGICAL-c316t-d282c431890dd3030f15ff90a4b6a8500b78908b1a8251ec6ffe6a8db74c898a3 |
| IEDL.DBID | U2A |
| ISSN | 0256-2499 |
| IngestDate | Thu Sep 25 00:41:56 EDT 2025 Wed Oct 01 05:55:10 EDT 2025 Thu Apr 24 23:02:36 EDT 2025 Fri Feb 21 02:42:14 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | pseudo-random encoding AES encryption CRC-32 Checksum image steganography Gzip compression Three bit LSB |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c316t-d282c431890dd3030f15ff90a4b6a8500b78908b1a8251ec6ffe6a8db74c898a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2031762698 |
| PQPubID | 2043821 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2031762698 crossref_citationtrail_10_1007_s12046_018_0848_4 crossref_primary_10_1007_s12046_018_0848_4 springer_journals_10_1007_s12046_018_0848_4 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-05-01 |
| PublicationDateYYYYMMDD | 2018-05-01 |
| PublicationDate_xml | – month: 05 year: 2018 text: 2018-05-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New Delhi |
| PublicationPlace_xml | – name: New Delhi – name: Dordrecht |
| PublicationSubtitle | Published by the Indian Academy of Sciences |
| PublicationTitle | Sadhana (Bangalore) |
| PublicationTitleAbbrev | Sādhanā |
| PublicationYear | 2018 |
| Publisher | Springer India Springer Nature B.V |
| Publisher_xml | – name: Springer India – name: Springer Nature B.V |
| References | DadgostarHAFsariFImage steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSBJournal of Information Security and Applications (JISA).2016309410410.1016/j.jisa.2016.07.001 JainMLenkaSKA Review of Digital Image Steganography using LSB and LSB ArrayInternational Journal of Applied Engineering Research201611318201824 ChanC-KChengL-MHiding data in images by simple LSB substitutionPattern Recognition20043746947410.1016/j.patcog.2003.08.0071072.68534 DaemenJRijmenVRijndael: the advanced encryption standardDr. Dobb’s Journal.200126031371391065.94005 Stanley C A Pairs of Values and the Chi-Squared Attackhttps://orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. Accessed on Jan 2018. Gailly J-L and Adler M Gzip Home Page. http://www.gzip.org/. Accessed on Jan 2018 WuH-CWuNITsaiCSHwangMSImage steganographic scheme based on pixel-value differencing and LSB replacement methodsIEE Proceedings Vision, Image and Signal Processing200515261161510.1049/ip-vis:20059022 Bashardoost M, Sulong G B and Gerami P 2013 Enhanced LSB image steganography method by using knight tour algorithm, vigenere encryption and LZW Compression. Int. J. Comput. Sci. Iss. (IJCSI) 10(2) 1: 221–227 WuD-ATsaiW-HA steganographic method for images by pixel-value differencingPattern Recognition Letters2003249–101613162610.1016/S0167-8655(02)00402-61048.68040 Sasivarnan C, Jagan A, Kaur J, Jyoti D and Rao D S 2011 Image quality assessment techniques in spatial domain. Int. J. Comput. Sci. Technol (IJCST) 2(3): 177–184 WangSYangBNiuXA Secure Steganography Method based on Genetic AlgorithmJournal of Information Hiding and Multimedia Signal Processing2010112835 LiBHeJHuangJShiYQA Survey on Image Steganography and SteganalysisJournal of Information Hiding and Multimedia Signal Processing201122142172 SahmoudSElmasryWAbudalfaS“Enhancement the security of AES against modern attacks by using Variable key block cipherInternational Arab Journal of e-Technology (IAJeT).2013311726 LouD-CSungC-HA steganographic scheme for secure communications based on the chaos and Euler TheoremIEEE Transactions on Multimedia.20046350150910.1109/TMM.2004.827493 KukapalliVRRaoTBReddyBSImage steganograpghy by enhanced pixel indicator method using most significant bit (MSB) compareInternational Journal of Computer Trends and Technology20141539710110.14445/22312803/IJCTT-V15P122 Singla D and Juneja M 2014 An analysis of edge based image steganography techniques in spatial domain. In: Recent Advances in Engineering and Computer Sciences (RAECS) 1–5 FisherRAYatesFStatistical tables for biological, agricultural and medical research1948LondonOliver & Boyd26270030.31503 MazurczykWCaviglioneLSteganography in Modern Smartphones and Mitigation TechniquesIEEE Communications Surveys and Tutorials201517133435710.1109/COMST.2014.2350994 Chen Y, Han Z, Li S, Lu C and Yao X H 2010 An adaptive steganography algorithm based on block sensitivity vectors using HVS features.In: 3rd International Congress in Image and Signal Processing. 1151–1155 Trivedi M C Sharma S and Yadav V K 2016 Analysis of several image steganography techniques in spatial domain: a survey. In; Second International Conference on Information and Communication Technology for Competitive Strategies (ICTCS ‘16). ACM. Article 84 CheddadACondellJCurranKMcKevittPDigital image steganography: Survey and analysis of current methodsSignal Processing201090372775210.1016/j.sigpro.2009.08.0101177.94138 PetitcolasFAPAndersonRJKuhnMGInformation hiding-a surveyProc. IEEE.19998771062107810.1109/5.771065 LuoWHuangFHuangJEdge Adaptive Image Steganography Based on LSB Matching RevisitedIEEE Transactions on Information Forensics and Security20105220121410.1109/TIFS.2010.2041812 PetersonWWBrownDTCyclic codes for error detectionProceedings of the IRE196149122823512801110.1109/JRPROC.1961.287814 Al-Hawi T, Al-Qutayri M and Barada H 2003 A testbed for evaluating security and robustness of steganography techniques. In: IEEE 46th Midwest Symposium in Circuits and Systems. 3: 1583–1586 Anand J V and Dharaneetharan G D 2011 New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. Proceedings of the 2011 In: International Conference on Communication, Computing 474–476 DigheDGand KapaleNDRandom Insertion Using Data Parity Steganography TechniqueInternational Journal of Engineering Science and Innovative Technology (IJESIT)201322364368 Wikipedia Cyclic redundancy check. https://en.wikipedia.org/wiki/Cyclic_redundancy_check. Accessed on Jan 2018 Akhtar N 2016 An LSB substitution with bit inversion steganography method. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics 43: 515–521 FridrichJGoljanMDuRDetecting LSB steganography in colour and gray-scale imagesIEEE Transactions on Multimedia200184222810.1109/93.959097 848_CR30 W Mazurczyk (848_CR3) 2015; 17 848_CR1 RA Fisher (848_CR24) 1948 J Daemen (848_CR20) 2001; 26 A Cheddad (848_CR27) 2010; 90 848_CR18 B Li (848_CR28) 2011; 2 848_CR17 S Sahmoud (848_CR19) 2013; 3 D-A Wu (848_CR8) 2003; 24 848_CR13 J Fridrich (848_CR15) 2001; 8 848_CR10 WW Peterson (848_CR16) 1961; 49 FAP Petitcolas (848_CR2) 1999; 87 S Wang (848_CR23) 2010; 1 C-K Chan (848_CR7) 2004; 37 VR Kukapalli (848_CR11) 2014; 15 W Luo (848_CR22) 2010; 5 D Dighe (848_CR12) 2013; 2 D-C Lou (848_CR21) 2004; 6 M Jain (848_CR29) 2016; 11 848_CR4 HA Dadgostar (848_CR14) 2016; 30 848_CR5 848_CR26 848_CR25 H-C Wu (848_CR9) 2005; 152 848_CR6 |
| References_xml | – reference: KukapalliVRRaoTBReddyBSImage steganograpghy by enhanced pixel indicator method using most significant bit (MSB) compareInternational Journal of Computer Trends and Technology20141539710110.14445/22312803/IJCTT-V15P122 – reference: FisherRAYatesFStatistical tables for biological, agricultural and medical research1948LondonOliver & Boyd26270030.31503 – reference: Wikipedia Cyclic redundancy check. https://en.wikipedia.org/wiki/Cyclic_redundancy_check. Accessed on Jan 2018 – reference: Al-Hawi T, Al-Qutayri M and Barada H 2003 A testbed for evaluating security and robustness of steganography techniques. In: IEEE 46th Midwest Symposium in Circuits and Systems. 3: 1583–1586 – reference: Akhtar N 2016 An LSB substitution with bit inversion steganography method. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics 43: 515–521 – reference: LouD-CSungC-HA steganographic scheme for secure communications based on the chaos and Euler TheoremIEEE Transactions on Multimedia.20046350150910.1109/TMM.2004.827493 – reference: Bashardoost M, Sulong G B and Gerami P 2013 Enhanced LSB image steganography method by using knight tour algorithm, vigenere encryption and LZW Compression. Int. J. Comput. Sci. Iss. (IJCSI) 10(2) 1: 221–227 – reference: PetersonWWBrownDTCyclic codes for error detectionProceedings of the IRE196149122823512801110.1109/JRPROC.1961.287814 – reference: LuoWHuangFHuangJEdge Adaptive Image Steganography Based on LSB Matching RevisitedIEEE Transactions on Information Forensics and Security20105220121410.1109/TIFS.2010.2041812 – reference: WuD-ATsaiW-HA steganographic method for images by pixel-value differencingPattern Recognition Letters2003249–101613162610.1016/S0167-8655(02)00402-61048.68040 – reference: Anand J V and Dharaneetharan G D 2011 New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. Proceedings of the 2011 In: International Conference on Communication, Computing 474–476 – reference: DadgostarHAFsariFImage steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSBJournal of Information Security and Applications (JISA).2016309410410.1016/j.jisa.2016.07.001 – reference: Chen Y, Han Z, Li S, Lu C and Yao X H 2010 An adaptive steganography algorithm based on block sensitivity vectors using HVS features.In: 3rd International Congress in Image and Signal Processing. 1151–1155 – reference: Singla D and Juneja M 2014 An analysis of edge based image steganography techniques in spatial domain. In: Recent Advances in Engineering and Computer Sciences (RAECS) 1–5 – reference: FridrichJGoljanMDuRDetecting LSB steganography in colour and gray-scale imagesIEEE Transactions on Multimedia200184222810.1109/93.959097 – reference: Stanley C A Pairs of Values and the Chi-Squared Attackhttps://orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. Accessed on Jan 2018. – reference: Gailly J-L and Adler M Gzip Home Page. http://www.gzip.org/. Accessed on Jan 2018 – reference: JainMLenkaSKA Review of Digital Image Steganography using LSB and LSB ArrayInternational Journal of Applied Engineering Research201611318201824 – reference: PetitcolasFAPAndersonRJKuhnMGInformation hiding-a surveyProc. IEEE.19998771062107810.1109/5.771065 – reference: MazurczykWCaviglioneLSteganography in Modern Smartphones and Mitigation TechniquesIEEE Communications Surveys and Tutorials201517133435710.1109/COMST.2014.2350994 – reference: SahmoudSElmasryWAbudalfaS“Enhancement the security of AES against modern attacks by using Variable key block cipherInternational Arab Journal of e-Technology (IAJeT).2013311726 – reference: WuH-CWuNITsaiCSHwangMSImage steganographic scheme based on pixel-value differencing and LSB replacement methodsIEE Proceedings Vision, Image and Signal Processing200515261161510.1049/ip-vis:20059022 – reference: DigheDGand KapaleNDRandom Insertion Using Data Parity Steganography TechniqueInternational Journal of Engineering Science and Innovative Technology (IJESIT)201322364368 – reference: LiBHeJHuangJShiYQA Survey on Image Steganography and SteganalysisJournal of Information Hiding and Multimedia Signal Processing201122142172 – reference: CheddadACondellJCurranKMcKevittPDigital image steganography: Survey and analysis of current methodsSignal Processing201090372775210.1016/j.sigpro.2009.08.0101177.94138 – reference: WangSYangBNiuXA Secure Steganography Method based on Genetic AlgorithmJournal of Information Hiding and Multimedia Signal Processing2010112835 – reference: Trivedi M C Sharma S and Yadav V K 2016 Analysis of several image steganography techniques in spatial domain: a survey. In; Second International Conference on Information and Communication Technology for Competitive Strategies (ICTCS ‘16). ACM. Article 84 – reference: ChanC-KChengL-MHiding data in images by simple LSB substitutionPattern Recognition20043746947410.1016/j.patcog.2003.08.0071072.68534 – reference: Sasivarnan C, Jagan A, Kaur J, Jyoti D and Rao D S 2011 Image quality assessment techniques in spatial domain. Int. J. Comput. Sci. Technol (IJCST) 2(3): 177–184 – reference: DaemenJRijmenVRijndael: the advanced encryption standardDr. Dobb’s Journal.200126031371391065.94005 – volume: 5 start-page: 201 issue: 2 year: 2010 ident: 848_CR22 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2010.2041812 – volume: 87 start-page: 1062 issue: 7 year: 1999 ident: 848_CR2 publication-title: Proc. IEEE. doi: 10.1109/5.771065 – volume: 152 start-page: 611 year: 2005 ident: 848_CR9 publication-title: IEE Proceedings Vision, Image and Signal Processing doi: 10.1049/ip-vis:20059022 – ident: 848_CR13 – volume: 2 start-page: 364 issue: 2 year: 2013 ident: 848_CR12 publication-title: International Journal of Engineering Science and Innovative Technology (IJESIT) – volume: 2 start-page: 142 issue: 2 year: 2011 ident: 848_CR28 publication-title: Journal of Information Hiding and Multimedia Signal Processing – ident: 848_CR17 – ident: 848_CR4 doi: 10.1109/RAECS.2014.6799604 – volume: 24 start-page: 1613 issue: 9–10 year: 2003 ident: 848_CR8 publication-title: Pattern Recognition Letters doi: 10.1016/S0167-8655(02)00402-6 – volume: 49 start-page: 228 issue: 1 year: 1961 ident: 848_CR16 publication-title: Proceedings of the IRE doi: 10.1109/JRPROC.1961.287814 – volume: 37 start-page: 469 year: 2004 ident: 848_CR7 publication-title: Pattern Recognition doi: 10.1016/j.patcog.2003.08.007 – start-page: 26 volume-title: Statistical tables for biological, agricultural and medical research year: 1948 ident: 848_CR24 – volume: 15 start-page: 97 issue: 3 year: 2014 ident: 848_CR11 publication-title: International Journal of Computer Trends and Technology doi: 10.14445/22312803/IJCTT-V15P122 – ident: 848_CR26 – volume: 30 start-page: 94 year: 2016 ident: 848_CR14 publication-title: Journal of Information Security and Applications (JISA). doi: 10.1016/j.jisa.2016.07.001 – volume: 26 start-page: 137 issue: 03 year: 2001 ident: 848_CR20 publication-title: Dr. Dobb’s Journal. – volume: 90 start-page: 727 issue: 3 year: 2010 ident: 848_CR27 publication-title: Signal Processing doi: 10.1016/j.sigpro.2009.08.010 – ident: 848_CR6 doi: 10.1109/CISP.2010.5646724 – ident: 848_CR10 doi: 10.1145/1947940.1948038 – ident: 848_CR30 doi: 10.1109/MWSCAS.2003.1562601 – ident: 848_CR18 – ident: 848_CR5 doi: 10.1007/978-81-322-2538-6_53 – volume: 3 start-page: 17 issue: 1 year: 2013 ident: 848_CR19 publication-title: International Arab Journal of e-Technology (IAJeT). – volume: 11 start-page: 1820 issue: 3 year: 2016 ident: 848_CR29 publication-title: International Journal of Applied Engineering Research – ident: 848_CR25 – volume: 6 start-page: 501 issue: 3 year: 2004 ident: 848_CR21 publication-title: IEEE Transactions on Multimedia. doi: 10.1109/TMM.2004.827493 – volume: 17 start-page: 334 issue: 1 year: 2015 ident: 848_CR3 publication-title: IEEE Communications Surveys and Tutorials doi: 10.1109/COMST.2014.2350994 – volume: 1 start-page: 28 issue: 1 year: 2010 ident: 848_CR23 publication-title: Journal of Information Hiding and Multimedia Signal Processing – volume: 8 start-page: 22 issue: 4 year: 2001 ident: 848_CR15 publication-title: IEEE Transactions on Multimedia doi: 10.1109/93.959097 – ident: 848_CR1 doi: 10.1145/2905055.2905294 |
| SSID | ssj0027083 |
| Score | 2.375216 |
| Snippet | Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Color Cryptography Embedding Encryption Engineering Image enhancement Image quality Integrity Performance tests Pixels Steganography |
| Title | New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check |
| URI | https://link.springer.com/article/10.1007/s12046-018-0848-4 https://www.proquest.com/docview/2031762698 |
| Volume | 43 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 0973-7677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0027083 issn: 0256-2499 databaseCode: KQ8 dateStart: 19780701 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 0973-7677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0027083 issn: 0256-2499 databaseCode: KQ8 dateStart: 20000101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 0973-7677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0027083 issn: 0256-2499 databaseCode: ABDBF dateStart: 20060601 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 0973-7677 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0027083 issn: 0256-2499 databaseCode: ADMLS dateStart: 20060601 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 0973-7677 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0027083 issn: 0256-2499 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 0973-7677 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0027083 issn: 0256-2499 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9tAEB5RcmkPCGirhgKaA4e-VtrYjr0-JpQQQdtLG4merH14AdGaKAmn_nlm7HVdEEXiZFn7OPjbnfnGu_MNwEE8SH2WZpGw0iqRWDMQJslSYXTsWSfWKsmJwl-_pdNZcnI2PAt53Mv2tnt7JFlb6i7ZjcZy9MuKyvwX7Bn0hqzmRYt4Fo26KEs22pvkywXFFnl7lPnQFHedUccw7x2K1r5msgkbgSTiqEF1C9bKahte_CMduA1bYVMu8V1Qjn7_Ev6QycIv38eCfZNDFqS-WeDlb7IZSGie6yoIVGNTOBpX11hWFww8EhHEstaT4GRMvKxwzsG8pmnIn1oi659wGYrdoa4cNkIT_Ea426tXMJsc_TicilBdQVgCaCUcBVuW6IPKpXPkyKQfDL3PpU5MqtVQSsM5ssoMNGe3ljb1vqQGZ7LEqlzp-DWsV9dV-QbQR3FMvtZHTsWJowAmc0pHsSG2I5XVvg-y_cyFDdLjXAHjV9GJJjMyBSFTMDJF0ocPf4fMG92NxzrvttgVYQsui4jMFVn6NFd9-Nji2TX_d7KdJ_V-C8-jej3xFchdWF8tbso9oikrsw-90fjzeMLP45-nR_v1Mr0FBIHhNg |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB6V5QA9tIWCui0tc-BAH0beJJs4R1pBl7Jw6SLRU-RHDIg2IDZ7af98ZzZOQ1GLxDHyQ449nm_G9nwDsBUPUp-lWSSstEok1gyESbJUGB175om1SnKg8NFxOjpJvpwOT0Mc97R97d5eSc41dRfsRm3Z-2VGZT4FW4DFhPyTqAeLu5-_He51fpZs2DcJzQV5F3l7mfmvTv6Go87GvHMtOkeb_acwacfZPDK53JnVZsf-vEPh-MAfeQZPgvWJu424rMCjslqFx7c4CVdhJez2KW4HSuq3z-EX6UIcf_0oGPQcMtP17AYvfpAyQhKTM10F5mtsMlJjfYVldc4ShWRhYjknquAoT7yo8JpPCTR1Q0BtyQv4gNOQRQ915bBhsOAvEih7uQYn-3uTTyMR0jYISytfC0denCW7ROXSOUJI6QdD73OpE5NqNZTScPCtMgPNYbOlTb0vqcCZLLEqVzpeh151VZUvAH0UxwTiPnIqThx5RplTOooNmVFSWe37INvVK2zgNOfUGt-Ljo2ZJ7ugyS54soukD-_-NLluCD3uq7zRikQR9va0iEgPEoSkuerD-3aFu-L_dvbyQbU3YWk0ORoX44Pjw1ewHM3Fhd9ZbkCvvpmVr8kWqs2bIPu_AeDr_eE |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB5RkKpyQEBbsTzn0ENLa603ySbOESgr2lJUqV2JW-RHDAgIKzac-PPMbJymRS0Sx8jOHPKN55HxfAPwLh6kPkuzSFhplUisGQiTZKkwOvbME2uV5Ebh7yfp0Tj5ejo8DXNOp-1t97Yk2fQ0MEtTVfcnzve7xjeSw5kwsyvzH7EXsJAwTwIp9Dja6zIu2fBwkl8XlGfkbVnzXyL-dkxdtPmoQDrzO6NlWAoBI-41CK_AXFmtwuIfNIKrsBIO6BTfBxbpD6_hnswXHv_cF-ynHDI59d0tXlyT_UBC9kxXgawamyHSWN9gWZ2zEiAFhVjOuCW4MRMvKpxwYq9JDPlWS4H7J5yGwXeoK4cN6QQ_kQ7YyzcwHh3-OjgSYdKCsARWLRwlXpZCCZVL58ipST8Yep9LnZhUq6GUhvtllRlo7nQtbep9SQvOZIlVudLxW5ivbqpyDdBHcUx-10dOxYmjZCZzSkexochHKqt9D2T7mQsbaMh5GsZV0REoMzIFIVMwMkXSg93fr0waDo6nNm-22BXhOE6LiEwXWf00Vz342OLZLf9X2Pqzdu_Ayx-fR8Xxl5NvG_AqmqkW34zchPn69q7couilNtszDX0AqkzlWA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=New+LSB-based+colour+image+steganography+method+to+enhance+the+efficiency+in+payload+capacity%2C+security+and+integrity+check&rft.jtitle=Sadhana+%28Bangalore%29&rft.au=Cem+kasapba%C5%9Fi%2C+Mustafa&rft.au=Elmasry%2C+Wisam&rft.date=2018-05-01&rft.pub=Springer+India&rft.issn=0256-2499&rft.eissn=0973-7677&rft.volume=43&rft.issue=5&rft_id=info:doi/10.1007%2Fs12046-018-0848-4&rft.externalDocID=10_1007_s12046_018_0848_4 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0256-2499&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0256-2499&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0256-2499&client=summon |