Image Steganography combined with Cryptography
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 1
Abstract
Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.
Authors and Affiliations
Vijaya Lakshmi Paruchuri, Dr. R. Sridevi, K. S. SadaSiva Rao
A NOVEL APPROACH OF JOB ALLOCATION USING MULTIPLE PARAMETERS IN IN CLOUD ENVIRONMENT
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service ove...
STUDY OF TEST CASE PRIORITIZATION TECHNIQUE USING APFD
Regression testing is used to ensure that bugs are fixed and new functionality introduce in a new version of a software that don't adversely affect the original functionality inherited from the previous version.Regressio...
Effective Risk Management In Organizations:The Nigerian Experience
This study is an investigation on effective risk management with respect to organizations in Nigeria. The objective of the paper is to examine factors militating against effective risk management in organizations. The pa...
A Survey on Intelligent Water Drop Algorithm
In the optimization areas, there are different algorithms that have been applied such as swarm intelligence algorithms. The researchers have found different algorithms by simulating the behaviors of various swarms of ins...
Improve Enterprise Search using pattern matching and web mining techniques for E-Commerce Website
With the extensive expansion in the number of E-commerce websites, applying Web Usage Mining techniques to improve business is imperative. Also, employee as well as visitor satisfaction is important for an enterprise. Th...