Open Access iconOpen Access

REVIEW

A Review of Image Steganography Based on Multiple Hashing Algorithm

by Abdullah Alenizi1, Mohammad Sajid Mohammadi2, Ahmad A. Al-Hajji2, Arshiya Sajid Ansari1,*

1 Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al-Majmaah, 11952, Saudi Arabia
2 Department of Computer Science, College of Engineering and Information Technology, Onaizah Colleges, Qassim, 56312, Saudi Arabia

* Corresponding Author: Arshiya Sajid Ansari. Email: email

Computers, Materials & Continua 2024, 80(2), 2463-2494. https://doi.org/10.32604/cmc.2024.051826

Abstract

Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item. From ancient times to the present, the security of secret or vital information has always been a significant problem. The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest. Therefore, several approaches, including steganography, have been developed by researchers over time to enable safe data transit. In this review, we have discussed image steganography based on Discrete Cosine Transform (DCT) algorithm, etc. We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman (RSA) method, the Blowfish technique, and the hash-least significant bit (LSB) approach. In this review, a novel method of hiding information in images has been developed with minimal variance in image bits, making our method secure and effective. A cryptography mechanism was also used in this strategy. Before encoding the data and embedding it into a carry image, this review verifies that it has been encrypted. Usually, embedded text in photos conveys crucial signals about the content. This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport. If the message is ever intercepted by a third party, there are several ways to stop this operation. A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.

Keywords


Cite This Article

APA Style
Alenizi, A., Mohammadi, M.S., Al-Hajji, A.A., Ansari, A.S. (2024). A review of image steganography based on multiple hashing algorithm. Computers, Materials & Continua, 80(2), 2463-2494. https://doi.org/10.32604/cmc.2024.051826
Vancouver Style
Alenizi A, Mohammadi MS, Al-Hajji AA, Ansari AS. A review of image steganography based on multiple hashing algorithm. Comput Mater Contin. 2024;80(2):2463-2494 https://doi.org/10.32604/cmc.2024.051826
IEEE Style
A. Alenizi, M. S. Mohammadi, A. A. Al-Hajji, and A. S. Ansari, “A Review of Image Steganography Based on Multiple Hashing Algorithm,” Comput. Mater. Contin., vol. 80, no. 2, pp. 2463-2494, 2024. https://doi.org/10.32604/cmc.2024.051826



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1384

    View

  • 311

    Download

  • 0

    Like

Share Link