Achieving security for images by LSB and MD5

Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant...

Full description

Bibliographic Details
Main Authors: Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos
Format: Article
Language:English
Published: Design for Scientific Renaissance 2012
Subjects:
Online Access:http://irep.iium.edu.my/25665/
http://irep.iium.edu.my/25665/
http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf
id iium-25665
recordtype eprints
spelling iium-256652012-09-06T06:56:27Z http://irep.iium.edu.my/25665/ Achieving security for images by LSB and MD5 Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha O. Alhussainan, Sondos QA75 Electronic computers. Computer science Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed. Design for Scientific Renaissance 2012-09-03 Article PeerReviewed application/pdf en http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and O. Alhussainan, Sondos (2012) Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3). pp. 127-139. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR/article/view/215
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
O. Alhussainan, Sondos
Achieving security for images by LSB and MD5
description Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed.
format Article
author Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
O. Alhussainan, Sondos
author_facet Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
O. Alhussainan, Sondos
author_sort Alahmad, Mohammad
title Achieving security for images by LSB and MD5
title_short Achieving security for images by LSB and MD5
title_full Achieving security for images by LSB and MD5
title_fullStr Achieving security for images by LSB and MD5
title_full_unstemmed Achieving security for images by LSB and MD5
title_sort achieving security for images by lsb and md5
publisher Design for Scientific Renaissance
publishDate 2012
url http://irep.iium.edu.my/25665/
http://irep.iium.edu.my/25665/
http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf
first_indexed 2023-09-18T20:38:15Z
last_indexed 2023-09-18T20:38:15Z
_version_ 1777409191148781568