Download PDFOpen PDF in browserLSB Image-to-Image Steganography in a Secure Way Using the Hash FunctionEasyChair Preprint 1048215 pages•Date: July 1, 2023AbstractThe goal of this task is to create a system for communicating privately with individuals while keeping information from the rest of the group. Comparing other items available on the internet, digital photos are the ones that are most suitable for usage as transmitters based on their accessibility. Within a picture, an image is concealed in this work. A variety of steganographic methods for concealing information in images, among which some are more challenging than others and each of them has a unique mix of advantages and disadvantages. Depending on the application, the encryption technology used may have varying requirements. The essential information may need to be completely invisible in certain situations, while secret information may need to be concealed in others. An overview of image steganography, including its uses and methodology, is the goal of this study. In this study, a secret image was concealed and encoded as an image using LSB (Least Significant Bit) techniques focusing on a hash function. The LSB of the secret image changed with the LSB of the cover image's pixel values. Since just the LSBs are altered, human eyes are unable to foresee the variation involving the cover and stego images. The findings of the proposed technique indicate that stego images secure the data with an acceptable PSNR and reduced MSE. Keyphrases: Data hiding, Image Steganography, LSB replacement, MSE, PSNR, hash function
|