Download now Free registration required
In this paper, the authors proposed a method which describes two steps for hiding the secret information by using the public steganography based on matching method. This is done by two steps: find the shared stego-key between the two communication parties over insecure networks by applying Diffie Hellman Key exchange protocol, then sender uses the secret stego-key to select pixels that it will be used to hide. Each selected pixel used to hide 8 bits which depends on the matching method. This steganographic protocol is more efficient than LSBs. It produces matching between the data bit parts and selected or least significant bits of each pixel.
- Format: PDF
- Size: 516.67 KB