A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128 | Views: 289

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016 | Popularity: 6.2 / 10


     

A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach

Raminder Jit Singh Kahlon, Vinay Bhardwaj


Abstract: Steganography is a technique for the secure transmission of data over the network. In this process, the secret information is transmitted by hiding this behind a signal or image or video. Steganography can be a solution which makes it possible to send news and information without being censored and without the fear of the messages being intercepted and traced back to us. In this process, the secret information is transmitted by hiding this behind a signal or image or video. This technique can be used for hiding images in 24-bit, 8-bit or gray scale format. There is a limit to the size of a file which you can embed information into. There is no provision for encryption in Least Significant Bit (LSB). The main motivation behind the work is that to make LSB more detectable and more secure and also the data that is sent behind the image is in more quantity.


Keywords: Stegnography, Image Stegnography, LSB, MLSB, Security, Data Hiding


Edition: Volume 5 Issue 7, July 2016


Pages: 408 - 412



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Raminder Jit Singh Kahlon, Vinay Bhardwaj, "A Secure Image Steganography Using Bit Shift Encryption & MLSB Approach", International Journal of Science and Research (IJSR), Volume 5 Issue 7, July 2016, pp. 408-412, https://www.ijsr.net/getabstract.php?paperid=ART2016165, DOI: https://www.doi.org/10.21275/ART2016165

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article
Top