<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/16904">
<title>Thesis Report</title>
<link>http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/16904</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786"/>
</rdf:Seq>
</items>
<dc:date>2026-04-27T00:17:08Z</dc:date>
</channel>
<item rdf:about="http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786">
<title>An Improved Zig Zag Pixel Selection Approach in LSB Based Secure  Image Steganography</title>
<link>http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786</link>
<description>An Improved Zig Zag Pixel Selection Approach in LSB Based Secure  Image Steganography
Wasim, Md
Steganography is a method that employs cryptographic techniques to encrypt sensitive&#13;
information, thus facilitating the transmission of confidential data from the sender to the receiver&#13;
over the transmission channel. Despite the fact that this data is not readily detectable, an intruder&#13;
would have a difficult time capturing it. In this paper, investigates an innovative approach for&#13;
image steganography that combines the Zigzag Pixel Selection technique with the Blowfish&#13;
encryption algorithm in order to bolster the security and capacity of concealed data. The encryption&#13;
procedure incorporates the Blowfish algorithm to ensure strong security of sensitive data, whereas&#13;
the Zigzag Pixel Selection technique assures covert integration within the image. Blowfish is an&#13;
exceptionally robust algorithm due to the variable length of its keys, which can vary between 32&#13;
bits and 448 bits. The previously mentioned flexibility empowers users to modify the key size in&#13;
&#13;
accordance with their particular security needs. Data security is enhanced and resistance to brute-&#13;
force attacks is generally improved with an extended key. Zigzag patterns are often used in various&#13;
&#13;
algorithms for data traversal or manipulation. In the context of image processing, a zigzag pattern&#13;
might be employed for pixel selection or scanning order. The basic idea is to traverse the pixels in&#13;
a zigzag fashion rather than a simple left-to-right, top-to-bottom order. Our contribution is to&#13;
improve the capacity of hidden data while embedding by using a 4-directional pixel selection&#13;
technique.
</description>
<dc:date>2024-01-20T00:00:00Z</dc:date>
</item>
</rdf:RDF>
