<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>M.SC. in Cyber Security</title>
<link>http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/16903</link>
<description/>
<pubDate>Mon, 27 Apr 2026 00:16:45 GMT</pubDate>
<dc:date>2026-04-27T00:16:45Z</dc:date>
<item>
<title>An Improved Zig Zag Pixel Selection Approach in LSB Based Secure  Image Steganography</title>
<link>http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786</link>
<description>An Improved Zig Zag Pixel Selection Approach in LSB Based Secure  Image Steganography
Wasim, Md
Steganography is a method that employs cryptographic techniques to encrypt sensitive&#13;
information, thus facilitating the transmission of confidential data from the sender to the receiver&#13;
over the transmission channel. Despite the fact that this data is not readily detectable, an intruder&#13;
would have a difficult time capturing it. In this paper, investigates an innovative approach for&#13;
image steganography that combines the Zigzag Pixel Selection technique with the Blowfish&#13;
encryption algorithm in order to bolster the security and capacity of concealed data. The encryption&#13;
procedure incorporates the Blowfish algorithm to ensure strong security of sensitive data, whereas&#13;
the Zigzag Pixel Selection technique assures covert integration within the image. Blowfish is an&#13;
exceptionally robust algorithm due to the variable length of its keys, which can vary between 32&#13;
bits and 448 bits. The previously mentioned flexibility empowers users to modify the key size in&#13;
&#13;
accordance with their particular security needs. Data security is enhanced and resistance to brute-&#13;
force attacks is generally improved with an extended key. Zigzag patterns are often used in various&#13;
&#13;
algorithms for data traversal or manipulation. In the context of image processing, a zigzag pattern&#13;
might be employed for pixel selection or scanning order. The basic idea is to traverse the pixels in&#13;
a zigzag fashion rather than a simple left-to-right, top-to-bottom order. Our contribution is to&#13;
improve the capacity of hidden data while embedding by using a 4-directional pixel selection&#13;
technique.
</description>
<pubDate>Sat, 20 Jan 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/11786</guid>
<dc:date>2024-01-20T00:00:00Z</dc:date>
</item>
</channel>
</rss>
