Skip to main content
. 2022 Nov 24;8:e1157. doi: 10.7717/peerj-cs.1157
ALGORITHM 2: The extracted algorithm on the receiver side
Input: The input to this function will be a Stego Image.
Output: The decrypted Target Text Message from Stego Image will be produced.
Begin
1 Find the text message sizeSand setS1= S * 8, i.e., the bitstream size.
2 Take a blank bit string named extracted bits, such as M
3 Traverse through the Stego image
4 fori= 1 toheight
5 for j= 1 towidth
6 Ifmore message bits are remaining to be extracted
7 Find the Least Significant Bit of the current pixel using the hash function used on the sender side
8 SB1= mod (((i−1) * height+j), 13)
9 SB= mod (SB1,4)
10 Store the LSB of the pixel in bit string M
11 End
12 End
13 End
14 Get all the bits in 8 column table where each row is the bits of the character in the hidden text
15 Convert the extracted bits to characters by multiplying with powers of 2
16 Apply Caesar cipher or Vigenère cipher which one used on the sender side
17 Print the hidden text
18 End