A. Kiran, C. Vimalarani, L. Ashwini, G. Gayithri, J. Supriya, T. Vinod
{"title":"Secure ReversibleImage Data Hiding (SRIDH) Using LSB Prediction Method","authors":"A. Kiran, C. Vimalarani, L. Ashwini, G. Gayithri, J. Supriya, T. Vinod","doi":"10.1109/ICCCI56745.2023.10128232","DOIUrl":null,"url":null,"abstract":"Protecting sensitive data in public networks from prying eyes of unauthorised users has emerged as a critical concern in recent years. To safeguard the confidentiality of digital media, one of the most difficult methods to implement is data concealing. Techniques for the reversible concealment of data in digital photographs have been proposed by us. Textual information, such as that pertaining to weapon designs, map layouts, and satellite specifications, must be sent to and received by the majority of research and defence institutions. In order to complete this task, you will need a text file as well as an image file. In addition to the message, we will have a cover image file. After then, the number of pixels contained within the cover image will be taken into account. That is where each individual piece of the secret text will be embedded. This method will be repeated until the final snippet of the secret text is found. Following this procedure, the data will be masked by the image. After that, we will give this picture file to our client, who will be provided with a reverse process to use in order to extract the original text from the image. In the realm of cyber security, there are a plethora of innovative procedures and algorithms that can hide data. Each method has its own significance, and the least significant bit method is the one that was utilised for this method (LSB).","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Protecting sensitive data in public networks from prying eyes of unauthorised users has emerged as a critical concern in recent years. To safeguard the confidentiality of digital media, one of the most difficult methods to implement is data concealing. Techniques for the reversible concealment of data in digital photographs have been proposed by us. Textual information, such as that pertaining to weapon designs, map layouts, and satellite specifications, must be sent to and received by the majority of research and defence institutions. In order to complete this task, you will need a text file as well as an image file. In addition to the message, we will have a cover image file. After then, the number of pixels contained within the cover image will be taken into account. That is where each individual piece of the secret text will be embedded. This method will be repeated until the final snippet of the secret text is found. Following this procedure, the data will be masked by the image. After that, we will give this picture file to our client, who will be provided with a reverse process to use in order to extract the original text from the image. In the realm of cyber security, there are a plethora of innovative procedures and algorithms that can hide data. Each method has its own significance, and the least significant bit method is the one that was utilised for this method (LSB).