Enter your keyword

2-s2.0-85016229566

[vc_empty_space][vc_empty_space]

Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images

Munir R.a

a Informatics Research Group, School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2016 IEEE.Animated GIF images consist of a number of frames that displayed in succession as a video. Capacity of hiding messages (or payload) in an animated GIF file is much greater than in a single GIF image. A modified EzStego steganography algorithm has been proposed for GIF images. The modified EzStego is a improved version of the original EzStego so that bits of the message can be embedded randomly in the image. The modified EzStego is based on chaos theory. In this paper we applied the modified EzStego algorithm for hiding the secret messages in the animated GIF images. Bits of the message are embedded randomly in each frame. Frames also can be selected randomly for increasing security. In order to more secure, the message is encrypted before embedding. The bits of the message is encrypted with random bit which is generated by a chaos map. Based on experiments, the modified EzStego algorithm can be applied to the animated GIF images with the minimal visual distortions.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]animated GIF images,Chaos maps,frame,Modified EzStego,random,Secret messages,Visual distortion[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]animated GIF images,chaos,frame,Modified EzStego,random[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICSITech.2016.7852608[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]