Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Steganography for Two and Three Lsbs Using Extended Substitution Algorithm


Affiliations
1 Department of Electronics and Telecommunications Engineering, Dnyanganga College of Engineering and Research, India
2 Department of Electronics and Telecommunications Engineering, Sinhgad College of Engineering, India
3 Department of Electronics and Telecommunications Engineering, RMD Sinhgad School of Engineering, India
     

   Subscribe/Renew Journal


The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab.

Keywords

Steganography, Cryptography, Encryption, Decryption, Extended Square Substitution Algorithm.
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 250

PDF Views: 0




  • Steganography for Two and Three Lsbs Using Extended Substitution Algorithm

Abstract Views: 250  |  PDF Views: 0

Authors

R. S. Gutte
Department of Electronics and Telecommunications Engineering, Dnyanganga College of Engineering and Research, India
Y. D. Chincholkar
Department of Electronics and Telecommunications Engineering, Sinhgad College of Engineering, India
P. U. Lahane
Department of Electronics and Telecommunications Engineering, RMD Sinhgad School of Engineering, India

Abstract


The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab.

Keywords


Steganography, Cryptography, Encryption, Decryption, Extended Square Substitution Algorithm.