CANLI
Yükleniyor Veriler getiriliyor…
/ Makaleler / Scopus Detay
Scopus 🔓 Açık Erişim YÖKSİS Eşleşti

Compensation of degradation, security, and capacity of lsb substitution methods by a new proposed hybrid n-lsb approach

Computer Science and Information Systems · Eylül 2021

YÖKSİS DOI Eşleşmesi Bulundu

Bu Scopus makalesi YÖKSİS veritabanında da kayıtlı. Aşağıda YÖKSİS verilerini görebilirsiniz.

YÖKSİS Kayıtları
Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach
Computer Science and Information Systems · 2021 SCI-Expanded
DOÇENT KEMAL TÜTÜNCÜ →
Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach
Computer Science and Information Systems · 2021 SCI-Expanded
DOKTOR ÖĞRETİM ÜYESİ ÖZCAN ÇATALTAŞ →

Makale Bilgileri

DergiComputer Science and Information Systems
Yayın TarihiEylül 2021
Cilt / Sayfa18 · 1311-1332
Erişim🔓 Açık Erişim
Özet This study proposes a new hybrid n-LSB (Least Significant Bit) substitution-based image steganography method in the spatial plane. The previously proposed n-LSB substitution method by authors of this paper is combined with the Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) encryption algorithms to improve the security of the steganography, which is one of the requirements of steganography, and the Lempel-Ziv-Welch (LZW), Arithmetic and Deflate lossless compression algorithms to increase the secret message capacity. Also, embedding was done randomly using a logistic map-based chaos generator to increase the security more. The classical n-LSB substitution method and the proposed hybrid approaches based on the previously proposed n-LSB were implemented using different secret messages and cover images. When the results were examined, it has been seen that the proposed hybrid n-LSB approach showed improvement in all three criteria of steganography. The proposed hybrid approach that consists of previously proposed n-LSB, RSA, Deflate, and the logistic map had the best results regarding capacity, security, and imperceptibility.

Yazarlar (2)

1
Kemal Tutuncu
2
Ozcan Cataltas

Anahtar Kelimeler

Data encryption Image steganography Logistic map Lossless compression

Kurumlar

Selçuk Üniversitesi
Selçuklu Turkey

Metrikler

1
Atıf
2
Yazar
4
Anahtar Kelime