Image Security Implementing Steganography and Cryptographic Methods

Authors

  • A Balasubramani Faculty of Computer Science & Engineering, SVPCET, PUTTUR, India
  • Subba Rao DV S.V.U.College of Engineering, S.V.University, TIRUPATI, India

DOI:

https://doi.org/10.26438/ijcse/v6i1.275279

Keywords:

Steganography, Cryptography, image hiding, Least-significant it(LSB) scheme

Abstract

Steganography is that the art of concealment the actual fact communication is going down, by concealment info in other info. Many different carrier file formats can be used, but digital pictures are the foremost well-liked because of their frequency on the web. This paper introduces 2 new strategies wherever in cryptography and steganography are combined to encode the information as well on hide the information in another medium through image process. This paper securing the image by encryption is finished by DES formula victimisation the key image. The encrypted image may be hide in another image by victimisation LSB techniques, so that the secret’s terribly existence is hid. The coding may be done by the same key image victimisation DES formula.

References

C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8 Annual Computer Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153- 159.

J.C. Judge, Steganography: Past, present, future. SANS Institute publication,http://www.sans.org/reading_room/ whitepapers/stenganography/552.php, 2001.

Km. Pooja ,Arvind Kumar , “Steganography- A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No.7, November 2010.

N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) 2634.

N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32-44.

N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.

P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083-2126.

R. Chandramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “ , International Workshop on DigitalWatermarking, Seoul, October 2004.

R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications,16(4), pp. 474-481.

S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23,2004, pp. 417-418.

T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i1.275279
Published: 2025-11-12

How to Cite

[1]
A. Balasubramani and D. Subba Rao, “Image Security Implementing Steganography and Cryptographic Methods”, Int. J. Comp. Sci. Eng., vol. 6, no. 1, pp. 275–279, Nov. 2025.

Issue

Section

Research Article