Image Security Using Steganography And Cryptographic Techniques

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 3

Abstract

 Steganography is the art of hiding the fact communication is taking place, by hiding information in other information.Many different carrier file formats can be used,but digital images are the most popular because of their frequency on the internet.This paper introduces two new methods where in cryptography and steganography are combined to encrypt the data as well as to hide the data in another medium through image processing . This paper securing the image by encryption is done by DES algorithm using the key image. The encrypted image can be hide in another image by using LSB techniques,so that the secret’s very existence is concealed. The decryption can be done by the same key image using DES algorithm.

Authors and Affiliations

R. Nivedhitha1 , Dr. T. Meyyappan,M. sc. ,M. Phil. ,M. BA. ,Ph. D2

Keywords

Related Articles

Personalized Query Based Search Techniques Using Association Rules

In mobile based search major problem is that interaction between the user and search are controlled by little numeral of factors in the mobile plans. By observing of necessitate for dissimilar types of concepts, present...

Power Aware Location Aided Routing

Routing is the process of transferring the data packets across the network from source node to destination node by selecting a suitable path. It is the responsibility of routing protocol to find the optimal path in terms...

Study of the Influence of Safety Factors by Performing Factor Analysis

Averages of 6,000 people die every day as a result of work-related accidents or diseases, totally more than 2.2 million work-related deaths per year. About 350,000 deaths out of this mortality are from workplace accident...

A Hybrid Modified Semantic Matching Algorithm Based on Instances Detection With Case Study on Renewable Energy

This Matching input keywords with historical or information domain is an important point in modern computations in order to find the best match information domain for specific input queries. Matching algorithms represent...

Using Apriori with WEKA for Frequent Pattern Mining

Knowledge exploration from the large set of data, generated as a result of the various data processing activities due to data mining only. Frequent Pattern Mining is a very important undertaking in data mining. Apriori a...

Download PDF file
  • EP ID EP103907
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

R. Nivedhitha1, Dr. T. Meyyappan, M. sc. , M. Phil. , M. BA. , Ph. D2 (2012).  Image Security Using Steganography And Cryptographic Techniques. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 3(3), 366-371. https://europub.co.uk/articles/-A-103907