Confidentiality of Data Through Steganography
Keywords:
Cryptography, JPEG Lossy Compression, DCT, DFT, DWTAbstract
Now-a-days providing security & making data to be confidential plays a major role. For the purpose of providing confidentiality we are employing the cryptography techniques. Even though the data get encrypted, the intruder easily modifies the data by knowing the presence of confidential data. Steganography, which can called as an extension to the cryptography. Hereby employing this technique, can remain the existence of information in confidential. For providing security an image is used as a carrier medium to hold the secret data. Thereby no one can have an idea there is a secret message with in an image. The LSB technique of steganography is going to be applied here and secret key is generated by using one of cryptography technique OTP. With this method we can hide the data efficiently and effectively.
References
- Danny Adiyan Z, Tito Waluyo Purboyo and Ratna Astuti Nugrahaeni,"Implementation of Secure Steganography on Jpeg Image Using LSB Method ",International Journal of Applied Engineering Research , Volume 13, Number 1 (2018) pp.
- M. Al-Husainy, ”A New Image Steganography Based on Decimal-Digits Representation, Computer and InformationScience”, vol. 4, no. 6, pp. 38-47, 2011.
- Akash Modi, Manu Bansal, “An Enhanced LSB Steganography Algorithm for Data Hiding”,International Journal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 5, May 2015.
- Mukesh Gurg and A.P. Gurudev Jangra “An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques”Proceeding of the IJAECSSE, Volume 4, Issue 1, January 2014
- Vandana Yadav & Sanjay Kumar Sharma,"A Survey Paper on Data Hiding in Images using Image Steganography",International Journal of Innovative Engineering Research (E-ISSN: 2349-882X) Vol 7, Issue 1, February 2017
- Thakur Ramesh Kumar, Saravanan Chandran, “Analysis of Steganography with Various Bits of LSB for Color Images”, International Conference on Electrical, and Optimization Techniques , 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.