Image Security Implementing Steganography and Cryptographic Methods
DOI:
https://doi.org/10.26438/ijcse/v6i1.275279Keywords:
Steganography, Cryptography, image hiding, Least-significant it(LSB) schemeAbstract
Steganography is that the art of concealment the actual fact communication is going down, by concealment info in other info. Many different carrier file formats can be used, but digital pictures are the foremost well-liked because of their frequency on the web. This paper introduces 2 new strategies wherever in cryptography and steganography are combined to encode the information as well on hide the information in another medium through image process. This paper securing the image by encryption is finished by DES formula victimisation the key image. The encrypted image may be hide in another image by victimisation LSB techniques, so that the secret’s terribly existence is hid. The coding may be done by the same key image victimisation DES formula.
References
C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8 Annual Computer Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153- 159.
J.C. Judge, Steganography: Past, present, future. SANS Institute publication,http://www.sans.org/reading_room/ whitepapers/stenganography/552.php, 2001.
Km. Pooja ,Arvind Kumar , “Steganography- A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No.7, November 2010.
N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) 2634.
N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32-44.
N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083-2126.
R. Chandramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “ , International Workshop on DigitalWatermarking, Seoul, October 2004.
R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications,16(4), pp. 474-481.
S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23,2004, pp. 417-418.
T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
