Image Steganography-Hiding Data within Image
Keywords:
Steganography, stego-key, AES, DES, LSBAbstract
Security of the data is of foremost important in today’s world. Security has become a main important field in information and communication technology. For highly secure, hidden communication and sharing of information steganography is used. Steganography is a method of hiding the existence of communication, by hiding information data in other carriers. Different carrier mediums can be used for this, but digital images are the most famous because of their frequent use on the internet. There are several techniques of steganography, among them some are too complicated than others. Every technique have their strong and weak parameters. LSB, DES and AES algorithm is been used in this project. LSB technique is simple, high payload, low complexity and easy to detect. AES and DES are the complex technique but provide high security. The execution time of LSB is more, DES moderate and AES takes less time. Using these three methods we are going to design our project. This will enhance the security of the data which is being transferred.
References
X. Zhou, W. Gong, W. Fu, L. Jing “An Improved Method for LSB based colour Image Steganography Combined with Cryptography”, Jin. Information Engineering School, Communication University of China,CUC. 15TH International confrence on Computer and Information Science(ICIS), 2016
L. Randa and P. Saxena, “Security Improvisation in Image Steganography using DES”, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET). Volume 3 Issue 7, July 2014.
S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 663-666.
D. Selent, “Advanced Encryption Standard”, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
B. Li, J. He, J. Huang, Y.Qi. Shi. “A survey on Image steganography and steganalysis”, Volume 2, Number 2, April 2011.
S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric AES algorithm," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, 2016, pp. 1-5.
doi: 10.1109/CDAN.2016.7570921
S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, "Hiding Existence of Communication Using Image Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.163-166, 2014.
C.R. Gaidhani, V.M. Deshpande, V.N. Bora, "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.67-70, 2014.
A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
S. Singh and V.K. Attri, “Dual Layer Security of data using LSB Image Steganography Method and AES Encryption ”, ISSN: 2231-2307, Volume-2, Issue-3, July 2015.
V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
Rajesh Shah and Yashwant Singh Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
