The output is "embedded" in a host image to hide the encrypted information. Embedding is performed either on the lower 1-bit layer or on several 1-bit layers. Decryption is performed by:
(i) extracting the binary image from the host image;
(ii) correlate the result with the original cipher.
In principle, any encryption generator can be used for this purpose and the method is designed to work with 24-bit colour images. The approach has a variety of applications and in this work we focus on the authentication and self-authentication of documents (letters and certificates, for example) that communicate through the Internet and therefore are vulnerable to e-fraud (for example , modification, editing, forgery, etc.).