Show simple item record

dc.contributor.advisorHossain, Muhammad Iqbal
dc.contributor.authorMajumder, Srabony
dc.contributor.authorTanu, Mohon Dash
dc.contributor.authorFaisal, S. M. Fahim
dc.contributor.authorSristy, Mumtahinah Rahman
dc.contributor.authorPaul, Rigan
dc.date.accessioned2023-12-10T06:17:12Z
dc.date.available2023-12-10T06:17:12Z
dc.date.copyright2023
dc.date.issued2023-05
dc.identifier.otherID 19101326
dc.identifier.otherID 19301184
dc.identifier.otherID 19301186
dc.identifier.otherID 19301169
dc.identifier.otherID 19301129
dc.identifier.urihttp://hdl.handle.net/10361/21941
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2023.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (page 45).
dc.description.abstractRecent works on steganography basically are focused on various network layers and multiple data-hiding techniques. These researches lead to image manipula- tion, contortion and small-scale payload. This paper proposes a new dimension of the steganography model by merging the techniques of hiding texts and images. In- stead of hiding only one type of data this proposed model is focusing on veiling two types of data (first text and then image) by masking one data (text) into another stego data (image) and then covering them both into a cover image. This model ensures a minimal peak-signal-to-noise ratio (PSNR) and no noise. This will be a model of suppressing more data in a stego container for one cover image using AES, MLSB and LSB respectively. This also should increase the payload capacity of em- bedding images through the steganographic system architecture with recognition. Here, we have used a pair of encoders and decoders for encryption and decryption to take two inputs and generate one hybrid output. The reverse of the encryption process will do the work for decrypting and decoding particular cryptic data. The AES (Advanced Encryption Standard) algorithm and LSB (Least Significant Bit) have been used to ensure our proposed model’s accuracy and effectiveness. More- over, using a modified 16-bit key is ensuring the safety of any confidential data of the user. It also accomplishes better execution by using ImageNet datasets. This model will expand and escalate the safety mechanism of steganography for concealing a larger amount of hybrid data. Furthermore, it can decide how many bits need to be changed in LSB depending on the length of the text that has to be encrypted in the host image. It is a hierarchy of two steganographic and one encrypt model. Last but not least, it makes certain of a distortion-free process where retrieving data after successfully concealing it is fruitful depending on higher accuracy, SSIM, PSNR and lower MSE.en_US
dc.description.statementofresponsibilitySrabony Majumder
dc.description.statementofresponsibility
dc.description.statementofresponsibilityMohon Dash Tanu
dc.description.statementofresponsibilityS. M. Fahim Faisal
dc.description.statementofresponsibilityMumtahinah Rahman Sristy
dc.description.statementofresponsibilityRigan Paul
dc.format.extent45 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectSteganographyen_US
dc.subjectTexten_US
dc.subjectImageen_US
dc.subjectAESen_US
dc.subjectMLSB LSBen_US
dc.subjectStegoen_US
dc.subjectPSNRen_US
dc.subjectSSIMen_US
dc.subjectMSEen_US
dc.subjectEncoder-decoderen_US
dc.subjectEncryption-decryption hybriden_US
dc.subject.lcshComputer security
dc.subject.lcshData protection
dc.subject.lcshCryptography
dc.subject.lcshDatabase management
dc.titleEnhanced and secured hybrid steganography model for hiding large dataen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB.Sc. in Computer Science and Engineering


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record