Achieving security for images by LSB and MD5
Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Design for Scientific Renaissance
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/25665/ http://irep.iium.edu.my/25665/ http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf |
id |
iium-25665 |
---|---|
recordtype |
eprints |
spelling |
iium-256652012-09-06T06:56:27Z http://irep.iium.edu.my/25665/ Achieving security for images by LSB and MD5 Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha O. Alhussainan, Sondos QA75 Electronic computers. Computer science Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed. Design for Scientific Renaissance 2012-09-03 Article PeerReviewed application/pdf en http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and O. Alhussainan, Sondos (2012) Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3). pp. 127-139. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR/article/view/215 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha O. Alhussainan, Sondos Achieving security for images by LSB and MD5 |
description |
Steganography is a technique used to hide a message inside video, audio, or image files. A hash function is a transformation that takes input values and returns a fixed-size string, which is called the hash value. In this paper, a message will be hidden inside an image by using the Least Significant Bits (LSB replacement) technique. This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. If it has been manipulated after hiding the information, it can be discovered by the owner of the key because the serial hash value will be changed. |
format |
Article |
author |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha O. Alhussainan, Sondos |
author_facet |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha O. Alhussainan, Sondos |
author_sort |
Alahmad, Mohammad |
title |
Achieving security for images by LSB and MD5 |
title_short |
Achieving security for images by LSB and MD5 |
title_full |
Achieving security for images by LSB and MD5 |
title_fullStr |
Achieving security for images by LSB and MD5 |
title_full_unstemmed |
Achieving security for images by LSB and MD5 |
title_sort |
achieving security for images by lsb and md5 |
publisher |
Design for Scientific Renaissance |
publishDate |
2012 |
url |
http://irep.iium.edu.my/25665/ http://irep.iium.edu.my/25665/ http://irep.iium.edu.my/25665/1/215-1577-1-PB-m.pdf |
first_indexed |
2023-09-18T20:38:15Z |
last_indexed |
2023-09-18T20:38:15Z |
_version_ |
1777409191148781568 |