<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>M.SC. in Cyber Security</title>
<link href="http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/16903" rel="alternate"/>
<subtitle/>
<id>http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/16903</id>
<updated>2026-04-27T00:17:12Z</updated>
<dc:date>2026-04-27T00:17:12Z</dc:date>
<entry>
<title>An Improved Zig Zag Pixel Selection Approach in LSB Based Secure  Image Steganography</title>
<link href="http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786" rel="alternate"/>
<author>
<name>Wasim, Md</name>
</author>
<id>http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786</id>
<updated>2026-04-23T04:10:24Z</updated>
<published>2024-01-20T00:00:00Z</published>
<summary type="text">An Improved Zig Zag Pixel Selection Approach in LSB Based Secure  Image Steganography
Wasim, Md
Steganography is a method that employs cryptographic techniques to encrypt sensitive&#13;
information, thus facilitating the transmission of confidential data from the sender to the receiver&#13;
over the transmission channel. Despite the fact that this data is not readily detectable, an intruder&#13;
would have a difficult time capturing it. In this paper, investigates an innovative approach for&#13;
image steganography that combines the Zigzag Pixel Selection technique with the Blowfish&#13;
encryption algorithm in order to bolster the security and capacity of concealed data. The encryption&#13;
procedure incorporates the Blowfish algorithm to ensure strong security of sensitive data, whereas&#13;
the Zigzag Pixel Selection technique assures covert integration within the image. Blowfish is an&#13;
exceptionally robust algorithm due to the variable length of its keys, which can vary between 32&#13;
bits and 448 bits. The previously mentioned flexibility empowers users to modify the key size in&#13;
&#13;
accordance with their particular security needs. Data security is enhanced and resistance to brute-&#13;
force attacks is generally improved with an extended key. Zigzag patterns are often used in various&#13;
&#13;
algorithms for data traversal or manipulation. In the context of image processing, a zigzag pattern&#13;
might be employed for pixel selection or scanning order. The basic idea is to traverse the pixels in&#13;
a zigzag fashion rather than a simple left-to-right, top-to-bottom order. Our contribution is to&#13;
improve the capacity of hidden data while embedding by using a 4-directional pixel selection&#13;
technique.
</summary>
<dc:date>2024-01-20T00:00:00Z</dc:date>
</entry>
</feed>
