Secure Secret Key Transfer Using Modified Hash Based LSB Method

Provided by: Creative Commons
Topic: Security
Format: PDF
Recent advancements in computer security have shifted the focus of security officials from, using only the cryptography techniques to using steganography as well, or the combination of both. In steganography the most widely used technique is the LSB method, but this technique being the simplistic of all, is well known and hence is vulnerable to attacks. However, modifying the LSB method to the point where it would be difficult or impractical to find the hidden message is a domain where an extensive work and research is required.

Find By Topic