Image Steganography combined with Cryptography

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 1

Abstract

Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.

Authors and Affiliations

Vijaya Lakshmi Paruchuri, Dr. R. Sridevi, K. S. SadaSiva Rao

Keywords

Related Articles

Optimal Tasks Assignment for Multiple Heterogeneous Processors with Dynamic Re-assignment

Distributed Computing System [DCS] has attracted several researchers by posing several challenging problems. In this paper we have developed a mathematical model for allocating “M” tasks of distributed program to “...

Performance Improvement of Face Recognition System using Selective Local Feature Vectors

Face recognition is one of the important applications of image processing and it has gained significant attention in wide range of law enforcement areas in which security is of prime concern. Although the existing automa...

Using Fuzzy Set as a Controller on the Lateral Dynamic of Autopilot to Reducing the Effect of the Atmospheric Disturbance

In this paper, used fuzzy set as a controller to control roll and yaw angles in lateral dynamic of the autopilot system for jet transport using MATLAB/SIMULINK. Autopilot systems are complex devices that demand exact con...

A new Approach for Obtaining Optimal Solution of Unbalanced Fuzzy Transportation Problem

The present paper attempts to study the unbalanced fuzzy transportation problem so as to minimize the transportationcost of products when supply, demand and cost of the products are represented by fuzzy numbers. In this...

An Instance Selection Algorithm Based On Reverse k Nearest Neighbor

Classification is one of the most important data mining techniques. It belongs to supervised learning. The objective of classification is to assign class label to unlabelled data. As data is growing rapidly, handling it...

Download PDF file
  • EP ID EP650162
  • DOI 10.24297/ijct.v9i1.4160
  • Views 97
  • Downloads 0

How To Cite

Vijaya Lakshmi Paruchuri, Dr. R. Sridevi, K. S. SadaSiva Rao (2013). Image Steganography combined with Cryptography. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 9(1), 976-984. https://europub.co.uk/articles/-A-650162