Image Steganography Based On Hill Cipher with Key Hiding  Technique

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 5

Abstract

 In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic document contains irrelevant or redundant information, it can be used as a “cover” to hide secret messages. Cryptography is the study of encoding and decoding secret messages where as Steganography is the  art and science of writing hidden messages in such a way that no one apart from the sender and intended  recipient even realizes there is a hidden message. In this paper we implement Hill Cipher algorithm, for hiding our text behind the cover image and decrypt the  cover image to get original text. The highlight of this paper is that, the key is encrypted and scrambled within  the cover image

Authors and Affiliations

Pavan N

Keywords

Related Articles

 Multimedia Based Community Question Answer by Harvesting Web Based Information

 Abstract: Community question answers have become extremely popular over the some past few years. It allows community members to share their thoughts by answering given question or acquire information from a set of...

 An Efficient Secure Anonymous Communication Protocol in MANET based on Destinations Location

 Abstract: The protocols and cryptographic techniques used in MANET are intended to provide complete security to the data transmitted with low cost. In hostile environments, as a part of providing security to data;...

Traffic Congestion Detection in Vehicular Adhoc Networks using GPS

In today’s world traffic congestion is the critical issue. Huge amount of time, fuel and money is wasted due to traffic jams all around the world. Drivers select the path that they consider will be the fastest; however t...

 Snmp Implementaton on Hp Routers with Ovpi (Openview Performance Insight) and Network Management

This study is a practical application of the informatics laboratory applied and gives us the score about how the SNMP protocol is brought together with OVPI (OpenView Performance Insight) in traffic protocol packets with...

An Evaluation of the Influence of Pupils’ Physiological Needs Satisfaction on Academic Performance of Public Primary Schools in Eastern Zone of Nakuru Municipality, Kenya

Abstract: This study investigated the influence of physiological needs on academic performance in public primary schools of the Eastern Zone of Nakuru Municipality. The study used survey research design to establish the...

Download PDF file
  • EP ID EP109478
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Pavan N (2013).  Image Steganography Based On Hill Cipher with Key Hiding  Technique. IOSR Journals (IOSR Journal of Computer Engineering), 11(5), 47-50. https://europub.co.uk/articles/-A-109478