Image Steganography combined with Cryptography
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 1
Abstract
Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.
Authors and Affiliations
Vijaya Lakshmi Paruchuri, Dr. R. Sridevi, K. S. SadaSiva Rao
Improvised Admissible Kernel Function for Support Vector Machines in Banach Space for Multiclass Data
Classification based on supervised learning theory is one of the most significant tasks frequently accomplished by so-called Intelligent Systems. Contrary to the traditional classification techniques that are used to val...
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...
Applying of an Ontology-driven Case-based Reasoning System in Logistics
The management of logistics projects is a well known part of management science. But until now, purely quantitative and hardĀ project management techniques like the critical path method and the project evaluation and rev...
A Difference Scheme Using Spline for a Class of Singular Boundary Value Problem
In this paper, a finite difference scheme using cubic splines has been discussed to find the numerical solution for a class of singular two point boundary value problems for certain ordinary differential equations. The c...
Performance evaluation of conflict serializability against 2PL in Homogenous Distributed Database
There are many techniques in the recent years that provide the synchronization among the transactions using shared data like 2 phase locking protocol and time stamping in distributed database system. These techniques are...