Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages

MM Al-Laham, F Omar, ZA Alqadi - 2022 International Arab …, 2022 - ieeexplore.ieee.org
2022 International Arab Conference on Information Technology (ACIT), 2022ieeexplore.ieee.org
Among the different forms of social media, textmessages are known to be the most
extensivelydisseminated forms of information. This informationcould be private or sensitive
in nature, and so need tobe shielded from prying eyes. To conceal textmessages in an
electronic photograph, the LeastSignificant Bit (LSB) technique is employed. Themechanism
of concealing the message is simpleenough to accomplish the process of concealingprivate
information yet, not change the carrierImage. Despite its simplicity and apparent success …
Among the different forms of social media, textmessages are known to be the most extensivelydisseminated forms of information. This informationcould be private or sensitive in nature, and so need tobe shielded from prying eyes. To conceal textmessages in an electronic photograph, the LeastSignificant Bit (LSB) technique is employed. Themechanism of concealing the message is simpleenough to accomplish the process of concealingprivate information yet, not change the carrierImage. Despite its simplicity and apparent success inhiding things, this approach must be used cautiously.In this study, we will examine a different and simpleto-implement approach to increase the LSB method'slevel of security and blocking any attacker attemptingto spy on the text message or retrieving its content,while maintaining a certain level of LSB method'sefficiency. The suggested solution relies on creating asecret and private key that is difficult to crack inorder to conceal the message. Cutting the digitalImage into blocks generates this key, which comprisesthe block's row and column lengths as well as theblock's image size, which is used to conceal themessage In addition to ensure that the sender andreceiver are both has a compatible technique bywhich the key is used to define the length of eachblock line and column and the block number thatcontains the text message, this will also set aside aportion of the Image to store the key.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果