0% found this document useful (0 votes)
50 views7 pages

Enhancing Communication Security With A Telegram Bot For Encrypted Image Communication Using F5-LSB Steganography

Uploaded by

DIKSHANT SHARMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views7 pages

Enhancing Communication Security With A Telegram Bot For Encrypted Image Communication Using F5-LSB Steganography

Uploaded by

DIKSHANT SHARMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

2024 International Conference on Expert Clouds and Applications (ICOECA)

Enhancing Communication Security with a


Telegram Bot for Encrypted Image Communication
using F5-LSB Steganography
Dr P.B.Kumbharkar Bishakha Gope Tanishka Chavan
Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering
JSPM’s Rajarshi Shahu College JSPM’s Rajarshi Shahu College JSPM’s Rajarshi Shahu College
of Engineering, Pune of Engineering, Pune of Engineering, Pune
[email protected] [email protected] [email protected]

Sakshi Deo Sakshi Nawale


2024 International Conference on Expert Clouds and Applications (ICOECA) | 979-8-3503-8579-3/24/$31.00 ©2024 IEEE | DOI: 10.1109/ICOECA62351.2024.00037

Department of Computer Engineering Department of Computer Engineering


JSPM’s Rajarshi Shahu College JSPM’s Rajarshi Shahu College
of Engineering, Pune of Engineering, Pune
[email protected] [email protected]

Abstract— In response to the increasing need for secure online focus centers on the development of a technically proficient
communication and growing data privacy concerns, this study Telegram bot specialized in image steganography,
introduces a technically robust Telegram bot for image
steganography. Utilizing the F5 algorithm for JPEG images and strategically catering to the prevalent usage of JPEG and
the LSB algorithm for PNG images, the bot addresses challenges PNG image formats. Drawing insights gleaned from the
such as preserving image quality while concealing substantial survey, we meticulously implement the F5 algorithm for
data and lacking user-friendliness in existing systems. The
JPEG images and the LSB algorithm for PNG images,
primary goal of this research study is to establish a secure and
user-friendly platform, ensuring accessibility and independence selected for their optimal balance between security
from specific systems. By incorporating encryption, the bot robustness and computational efficiency. The bot streamlines
guarantees secure message transmission, making it resilient to the steganography process within the Telegram environment,
interception or detection attempts. This proposed system offers
a dependable and efficient approach, harmonizing image furnishing users with an intuitive interface for seamless
quality preservation with effective data concealment for secure interaction.
communication. The Telegram bot’s technical foundation,
coupled with advanced steganography techniques, positions it as Subsequent sections of the paper will perform a
a versatile and accessible tool, meeting the evolving demands of
secure communication in the digital era. thorough analysis of relevant research, providing a
comprehensive discussion on the architectural framework
Keywords: Image Steganography, Telegram bot, Least Significant and features of the proposed system. Additionally, this study
Bit(LSB), Portable Network Graphics(PNG), Joint Photographic
Experts Group (JPG), Peak Signal-to-Noise Ratio(PSNR), Mean-
will present specific images to the system for encoding,
Square Error(MSE), F5, Elliptic Curve Digital Signature followed by rigorous parameter calculations and evaluation
Algorithm(ECDSA) of the system.

II. RELATED WORK


I. INTRODUCTION
S.Rahman et al.[2] their study highlights
In the rapidly evolving domain of digital
steganography's crucial role in modern data security,
communication, ensuring data integrity stands as a suggesting its combination with compression, spread
paramount concern. Steganography, a technique for hiding spectrum, and cryptography advancements. The paper
messages within seemingly innocuous mediums, emerges as systematically reviews diverse steganography techniques,
a robust strategy to fortify communication security against discussing their pros, cons, and importance in various
unauthorized access. Particularly, image steganography domains. It also covers key aspects such as image
involves concealing messages within image data, leveraging steganography terms, performance metrics, and practical
applications, offering a concise resource for better
sophisticated techniques such as the least significant bit
understanding.
(LSB) embedding, discrete cosine transform, and wavelet-
based steganography. Niklas Bunzel et al.[4] explore Telegram's potential for
steganography, using the F5 algorithm. The study deems
Expanding upon the foundational concepts elucidated in Telegram viable for textual steganographic messages,
previous survey paper [16], which underscored the pivotal proposing solutions for multimedia constraints, such as
role of image steganography bots, this pragmatic message splitting or video steganography. Overall, the
implementation paper takes a significant stride forward. The

979-8-3503-8579-3/24/$31.00 ©2024 IEEE 137


DOI 10.1109/ICOECA62351.2024.00037
Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.
research demonstrates Telegram's feasibility and capacity for W. Abduallaha and A. M. S. Rahma[14] presents a
effective steganographic communication. comprehensive overview of some steganography techniques,
categorizing them based on types. Their study also analyzes
LSB-based image steganography was reviewed by embedding capacity, imperceptibility, and security for each
M.A.Aslam et al.[5] from 2016 to 2020, identifying 17 method, emphasizing the inherent tradeoff between capacity
approaches, 20 datasets, and three prominent frameworks. and image quality. Identifying limitations in spatial and
The study emphasizes four key parameters for assessing transform domain approaches.
image steganography quality, noting improved PSNR and
MSE. Challenges include managing secret data size and D. Neeta et al.[15] explore steganography's importance,
secrecy and highlighting the significant quality enhancement emphasizing LSB embedding in cover images. The paper
achieved through LSB techniques. focuses on hiding data in the least significant bits, particularly
in 24-bit, 8-bit, or grayscale formats. With a strong emphasis
Genc et al. [6] optimize ECDSA by removing inversion on image steganography, the study presents results for 2, 4,
operations, enhancing efficiency and speed without and 6 LSBs in .png and .bmp files, showcasing the
compromising security. Implemented in Python with P-521 technique's effectiveness.
elliptic curve and SHA-512, their method reduces execution
times for key processes, particularly addressing time- B. Gope, et al.[16] introduced a paper presenting a user-
consuming operations in modular arithmetic. friendly Telegram bot for image steganography, employing
the F5 algorithm for JPEG and LSB algorithm for PNG
L. Kumar Gupta et al. [7] investigate secure images. The system prioritizes secure communication by
communication through image steganography, comparing utilizing encryption, ensuring hidden messages'
techniques such as least significant bit and most significant confidentiality. The approach aims to address challenges like
bit substitution in formats like JPG, JPEG, and PNG. The image quality preservation, user accessibility and security
study emphasizes the efficiency of JPG in minimizing concerns in existing steganography systems, presenting an
distortion, providing valuable insights for secret service effective solution for secure communication.
agencies and the general public.
Many image steganography tools today feature complex
Comparison of popular steganography tools was done interfaces or rely on command-line operations, limiting user-
by M. A. Islam et al. [8], exploring different embedding friendliness and compatibility. While supporting various
algorithms for concealing secret data in various mediums. image formats, they often prioritize BMP, JPG, and PNG,
The study, assessing seven tools, highlights OpenStego and despite JPG and PNG being more commonly used. These
S-Tools as top performers, revealing insights into their tools offer multiple encryption options, potentially
strengths and weaknesses. This analysis informs future compromising security due to unfamiliarity with algorithms.
research and software development aimed at enhancing Simplifying and addressing these issues would enhance user
steganography tools. experience and security. The survey suggests F5 is effective
for jpg, while LSB is better for png. An interactive, user-
A comparative study by Ansari et al.[10] evaluated friendly tool focusing on these formats, ensuring secure and
image steganography methods (BMP, JPEG, PNG). BMP efficient message encryption, and dynamically selecting the
showed superior perceptibility, JPEG algorithms resisted best encoding algorithm is needed. Additionally, exploring
steganalysis, and PNG methods were secure for small data. Telegram for enhanced security features in image
BMP excelled in high-capacity scenarios, emphasizing the steganography is recommended.
need to choose suitable steganography techniques and cover
image formats to avoid detection. III. METHODOLOGIES

The proposed system, identified after a comprehensive


Secure data transmission was explored by H. Kaur and survey and acknowledging the limitations of existing tools,
A. Kakkar[11] through LSB substitution steganography in aims to develop an accessible and secure steganography tool
PNG, JPG, and BMP images. Their method achieves in the form of a Telegram bot. Tailored to accommodate the
distortion-free data embedding, focusing on key metrics like prevalent image formats, JPG and PNG, the system utilizes
PSNR and MSE. The study underscores a balanced trade-off the LSB or F5 steganography techniques based on the
between embedding capacity and stego image quality, specific image format [16].
ultimately favouring PNG for superior results in LSB
steganography. A. System Architecture
1. Key Generation:
Majumdar et al.[13] introduce a novel technique using
F5 steganography for secure data sharing within JPEG The system employs the ECDSA algorithm to
images. The method combines AES encryption, ECDH key generate cryptographic key pairs upon bot initiation.
agreement, and ECDSA digital signatures, compressed into a A secure key generation module creates private and
zip file. The paper addresses challenges in steganographic public keys, with the public key shared for message
algorithms, emphasizing F5's matrix encoding for improved encryption and the private key securely linked to the
security. hashed username in the database.(fig 1).

2. Message Encoding:

138

Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.
The sender initiates embedding by providing a extensive customization, and access to a
cover image and a confidential message, which rich repository of development tools,
undergoes encryption using the recipient's public making it a preferred choice for online
key for secure communication. Image-format- activities.
specific encoding methods are employed: LSB
 Telegram: A cloud-based messaging
concealment for PNG images and the F5
steganography algorithm for JPG images. platform with APIs for building custom
(fig 2). bots and communication solutions.
 Python: A high-level programming
3. Message Decoding: language known for its simplicity and
Upon receiving the stego image, the receiver extensive library ecosystem.
initiates the decoding process using /unlock
command. The system identifies the format and 2. Libraries
selects the appropriate decoding algorithm,
Following are the python libraries employed
revealing the concealed message (fig 3).
to implement the system :
These three modules collectively contribute to  eciespy: For ECDSA key generation and
a secure and seamless image steganography process. ECIES encryption, ensuring secure
communication.
 Flask: A lightweight web framework for
simplifying the development of scalable web
applications.
 pyTelegramBotAPI: For interacting with the
Telegram Bot API, facilitating bot
development.
 Flask-SQLAlchemy: Extension for Flask
integrating SQLAlchemy for database
operations within Flask applications.
Fig. 1. Key Generation
 NumPy: For calculating MSE and PSNR
values, by comparing encoded images with
cover image.

C. Algorithms
1. ECDSA
ECDSA is a robust digital signature
algorithm employed within the system,
ensures data integrity and authenticity. It
Fig. 2. Message Encoding utilizes keys derived from elliptic curve
cryptography, facilitating secure signature
creation, verification, and efficiency in
resource-constrained environments, making
it an apt choice.

2. LSB
LSB algorithm serves as a fundamental
technique in steganography, enabling the
concealment of messages within digital
Fig. 3. Message Decoding media. Particularly adept at embedding
information within images or audio files
without perceptibly altering their quality,
B. Tools Selection and Libraries LSB operates by sequentially embedding
1. Tools and Programming Language message bits into the least significant bit of
 Visual Studio Code (VSCode): A each pixel's color value. This technique
versatile IDE developed by Microsoft, allows for imperceptible alterations to the
offering advanced features for code image's appearance, ensuring covert
editing and debugging. communication while preserving visual
 Operating System (Linux): Opting for integrity.
Linux online ensures robust security,

139

Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.
3. F5 IV. SYSTEM INTERFACE
The F5 steganographic algorithm enhances
the concealment of secret information within The Telegram bot interface is carefully crafted for easy
digital images by modifying the least significant and precise interaction with the secure image steganography
bit of each pixel. Employing a data-hiding function system. It uses straightforward text-based commands within
to distribute secret data randomly throughout the the Telegram environment, ensuring a seamless user
image, F5 resists detection against visual attacks experience. These commands integrate with the Telegram
such as filtering or compression and statistical API, establishing a secure and direct communication channel
analysis. Leveraging matrix encoding and pseudo- for user input. The design focuses on simplicity, making it
random shuffling of Discrete Cosine Transform accessible for users with varying technical backgrounds.
coefficients, F5 ensures robustness and security in Overall, the interface provides a user-friendly platform for
concealing and extracting messages from digital secure image steganography.
images, particularly in JPEG format.
A. Commands:
D. Tool Features
1. Dynamic URL Security Feature: 1) /begin - Initialization Command:
a. Dynamic URL Generation: Initializes the bot, providing users with access to
The system dynamically generates the steganography functionalities.
unique URLs for steganographic images,
which change every 6 hours and 5 minutes, 2) /assist - Workflow and Command Display:
limiting access within a specified time Displays the Workflow and Available Commands,
window. This temporal aspect ensures offering users guidance on the system's functionality.
security by preventing unauthorized access
beyond the designated time frame. 3) /fetch_key - Retrieve Public Key:
Retrieves and displays the user's public key, a
b. Temporal Link Validity: crucial component in the encryption and decoding
The system implements a temporal link processes.
validity mechanism to invalidate URLs after
a predefined time limit, mitigating the risk of 4) /lock - Message Embedding Process:
attackers attempting to access or decode Initiates the process of generating the encoded
steganographic images beyond the image.
designated period. Procedure after entering the command:
Step 1: Send the message you want to encrypt.
2. Resource Management Feature: Step 2: Share the recipient's public key.
a. Efficient Resource Handling: Step 3: Upload the cover image (as a document)
The system optimizes efficiency with
multi-threading for concurrent task 5) /unlock - Decode Process:
processing and systematically clears Reveals the hidden text within an encoded image.
temporary storage, managed by a transient Procedure after entering the command:
database or cache, after each process to Step 1: Upload the encoded image (as a document)
prevent data leakage.
6) /abort - Process Termination:
b. Memory Allocation Safeguards: Halts any ongoing processes, providing users with
Each process is allocated dedicated an efficient means to cease current actions, ensuring
memory to prevent resource exhaustion, system integrity.
ensuring responsive system performance,
even during peak usage, and maintaining 7) /new_identity - Generate New Key:
operational efficiency. Initiates the process of generating a new
c. Data Integrity and Protection: cryptographic key pair, with cautionary notes regarding
Sensitive information is securely potential data loss. Text encrypted with the previous key
handled, with temporary storage routinely cannot be recovered.
cleared to prevent unauthorized access, while
robust process management mechanisms B. System Overview
maintain data integrity and protect against
leaks. Within the realm of steganography tools, our
proposed system is designed with the aim to create a
The technical implementation involves secure key user-friendly, machine- and operating system-
generation, image embedding with encryption and independent tool that securely encodes the message into
steganography, quality assurance with SSIM and PSNR the cover image.
metrics, dynamic URL generation, and efficient resource
management, ensuring system security and user
confidence in secure image steganography.

140

Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.
Fig. 4. GUI Image 1 Fig. 6. GUI Image 3

Upon accessing the front page of the bot, users are This proposed system facilitates message encoding
prompted to initiate the process by entering the "/begin" into the widely used image formats, namely JPG and
command. The "/assist" command is readily available PNG. Its user-friendly and comprehensible interface
on this page to furnish users with a comprehensive list enhances accessibility, rendering it an easily deployable
of commands essential for effective communication tool for a broad user base.
with the system.
V. RESULTS AND DISCUSSION

Evaluation is crucial for assessing the bot's performance


in tasks like encoding, decoding, and image format
identification. Utilizing a diverse image database, the bot
encodes cover images with secret messages, subjecting the
generated stego images to scrutiny.

1. Parameters Evaluation For Stego Image


Following parameters will be used in order to
check the quality of encoding done by the bot.

a. MSE:
It calculates intensity differences between
original and stego images. Lower MSE indicates
minimal impact on image quality.
b. PSNR:
A measure of encoded image quality in
relation to the original is the Peak Signal to Noise
Fig. 5. GUI Image 2
Ratio. It quantifies how well-embedded
This figure 5 illustrates the encoding process of the information is concealed without compromising
bot. To encode a secret message into the cover image, image clarity. Higher PSNR values signify
users are required to input the "/lock" command and superior image preservation.
provide the necessary input as prompted by the bot.

This figure 6 demonstrates the decoding process, c. Comprehensive Performance Analysis with Visual
where the message is decoded from the stego image. Representation
Users can achieve this by entering the "/unlock"
command and submitting the stego image as input to the The table I presents some of the cover images
bot. that were encoded using the Telegram bot,
resulting in stego images in both JPG and PNG
formats.

141

Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.
JPG Format original and encoded images: PSNR and lower MSE values indicate that
embedded information remains covert while
TABLE I. JPG Outcomes minimizing the impact on the visual fidelity of the
stego image.
S Original Encoded
PSNR value MSE value
no. image image
2. Enhanced Privacy and Performance in Secure Image
Steganography System:

1. 52.58112203 0.35889561 a. Prioritizing User Privacy:


The system places a strong emphasis on user
privacy by employing the ECDSA algorithm for
key pair generation, ensuring robust cryptographic
security. Private keys are securely linked to hashed
2. 48.09802003 1.00757726 usernames, enhancing privacy and data protection
throughout the system. This focus on user privacy
is evident across all aspects of system design.

b. Achieving the Identification Process:


3. 53.88326912 0.2659214 The ECDSA algorithm is instrumental in
ensuring unique user identifiers, contributing to a
secure and distinctive association between
cryptographic keys and user identities. Hashed
usernames serve as secure links to private keys
4. 50.70583591 0.55270929
within the system, bolstering the identification
process. Accuracy and security are paramount
considerations, ensuring trustworthy interactions
PNG Format original and encoded images: within the steganography system.

TABLE II. PNG Outcomes c. Ensuring Embedded Data Preservation:


To maintain the integrity of embedded data,
S Original Encoded PSNR
MSE value our system employs various techniques. Senders
no. image image value
encrypt messages using the recipient's public key,
ensuring end-to-end security during message
transmission. Image-specific encoding methods
1. 71.952575 0.0041478
are implemented for secure data embedding within
cover images. Additionally, resource management
features optimize efficiency and data integrity,
preventing resource exhaustion and ensuring
2. 71.748424 0.0043474 secure data preservation. Dynamic URLs and
regular clearing of temporary storage further
contribute to data preservation and security.

d. Improving Performance and Achieving High


3. 78.928356 0.0008322 Accuracy:
Performance enhancements are achieved
through multi-threading, which enhances system
efficiency and processing speed. The ECDSA
algorithm ensures accurate cryptographic
4. 78.939900 0.0008302 operations, contributing to the system's reliability
and security. These measures collectively
contribute to improved performance and high
accuracy in the system.
PSNR and MSE quantify the perceptual
quality and distortion introduced during the
encoding process in image steganography. Higher

142

Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.
In essence, the privacy-centric secure image [7] L. Kumar Gupta, A. Singh, A. Kushwaha and A. Vishwakarma,
steganography system integrates cryptographic strength, "Analysis of Image Steganography Techniques for Different
Image Format," 2021 International Conference on Advances in
robust identification processes, effective data preservation Electrical, Computing, Communication and Sustainable
measures, and a focus on performance and accuracy. This Technologies (ICAECT), Bhilai, India, 2021, pp. 1-6, doi:
comprehensive approach embodies the commitment to user 10.1109/ICAECT49130.2021.9392492.
privacy, system efficiency, and the precision of embedded
[8] M. A. Islam, M. A. -A. K. Riad and T. S. Pias, "Performance
data. Analysis of Steganography Tools," 2020 2nd International
Conference on Advanced Information and Communication
VI. CONCLUSION Technology (ICAICT), Dhaka, Bangladesh, 2020, pp. 428-433,
doi: 10.1109/ICAICT51780.2020.9333473.
In conclusion, the introduction of a technically robust
[9] Jayapandiyan, Jagan Raj, C. Kavitha, and K. Sakthivel.
Telegram bot for image steganography represents a notable "Enhanced least significant bit replacement algorithm in spatial
advancement in addressing critical challenges within secure domain of steganography using character sequence
online communication. Through the adept utilization of the optimization." IEEE Access 8 (2020): 136537-136545.
F5 algorithm for JPEG images and the LSB algorithm for
[10] Ansari, Arshiya & Mohammadi, Mohammad & Parvez,
PNG images, the bot successfully achieves a delicate balance Mohammad. (2019). A Comparative Study of Recent
between maintaining image quality and concealing Steganography Techniques for Multiple Image Formats.
substantial data. Furthermore, the seamless integration of International Journal of Computer Network and Information
encryption serves to fortify the system, ensuring not only Security. 11. 11-25. 10.5815/ijcnis.2019.01.02.
secure message transmission but also enhancing resilience [11] H. Kaur and A. Kakkar, "Comparison of different image
against interception or detection attempts. This innovative formats using LSB Steganography," 2017 4th International
solution not only provides a reliable and efficient platform Conference on Signal Processing, Computing and Control
but also prioritizes user-friendliness and system (ISPCC), Solan, India, 2017, pp. 97-101, doi:
10.1109/ISPCC.2017.8269657.
independence, thereby broadening its accessibility across
diverse user demographics. With its advanced steganography [12] Vigil, MS Antony, Sameer Singh Rathor, and Jitendra Singh.
techniques and solid technical foundations, the Telegram bot "Secure binary image steganography using F5 algorithm based
emerges as a versatile tool, well-positioned to meet the on data hiding and diffusion techniques." Int. J. Comput.
Technol. Appl 9.10 (2016): 4843-4857.
evolving demands of secure communication in the digital era
and beyond. Looking ahead, the future scope of this study [13] Majumdar, S., Maiti, A., Das, S., & Das, A. (2016). New
holds the potential for further enhancements, including the secured data sharing technique using elliptic curve
integration of additional steganography algorithms, cryptography and F5 steganography. International Journal of
Scientific and Engineering Research, 7(4), 1376-1380. ISSN
refinement of user interface features, and compatibility with 2229-5518.
emerging communication platforms. These forthcoming
advancements can enhance the capabilities and accessibility [14] Abduallah, Wafaa Mustafa, and Abdul Monem S. Rahma. "A
of secure communication technologies to unprecedented review on steganography techniques." American Scientific
Research Journal for Engineering, Technology, and Sciences
levels by establishing a more secure and interconnected (ASRJETS) 24.1 (2016): 131-150.
digital landscape.
[15] D. Neeta, K. Snehal and D. Jacobs, "Implementation of LSB
Steganography and Its Evaluation for Various Bits," 2006 1st
REFERENCES International Conference on Digital Information Management,
Bangalore, India, 2007, pp. 173-178, doi:
[1] Dodeja, Ujjwal. BaatCheet: Android chat application coupling 10.1109/ICDIM.2007.369349.
End-to-End encryption and LSB substitution. BS thesis.
University of Twente, 2024. [16] Gope, Bishakha, et al. "Design and Comparative Analysis of a
User-Friendly Telegram Bot for Image Steganography using F5
[2] S. Rahman et al., "A Comprehensive Study of Digital Image and LSB Algorithms." 2023 8th International Conference on
Steganographic Techniques," in IEEE Access, vol. 11, pp. Communication and Electronics Systems (ICCES). IEEE, 2023.
6770-6791, 2023, doi: 10.1109/ACCESS.2023.3237393.

[3] Jebur, Sabah Abdulazeez, et al. "Hiding Information in Digital


Images Using LSB Steganography Technique." International
Journal of Interactive Mobile Technologies 17.7 (2023).

[4] Bunzel, Niklas, Tobias Chen, and Martin Steinebach. "Using


Telegram as a carrier for image steganography: Analysing
Telegrams API limits." Proceedings of the 17th International
Conference on Availability, Reliability and Security. 2022.

[5] M. A. Aslam et al., "Image Steganography using Least


Significant Bit (LSB) - A Systematic Literature Review," 2022
2nd International Conference on Computing and Information
Technology (ICCIT), Tabuk, Saudi Arabia, 2022, pp. 32-38,
doi: 10.1109/ICCIT52419.2022.9711628.

[6] Genç, Yasin & Afacan, Erkan. (2021). Design and


Implementation of an Efficient Elliptic Curve Digital Signature
Algorithm (ECDSA). 1-6.
10.1109/IEMTRONICS52119.2021.9422589.

143

Authorized licensed use limited to: J.C. Bose University of Science and Technology YMCA Faridabad. Downloaded on November 06,2024 at 10:21:14 UTC from IEEE Xplore. Restrictions apply.

You might also like