Secure Image Hiding Algorithm using Cryptography and Steganography

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5

Abstract

 In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography  and steganography are the two major techniques for secret communication.In this paper,the secret image is first  encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique  compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of  steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key  factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non – Repudiation

Authors and Affiliations

Hemlata Sharma

Keywords

Related Articles

 Analyzing Process Behavior to Predict Resource Allocation in Distributed Environment by Using Time Series and Online Predictive Approach Algorithm

 Abstract:A distributed system is a collection of different computers to handle large amount of data, the connected computers can share and coordinate their data on network. It is very difficult to for server to han...

 Incremental Sequential Pattern Tree Mining

 In this paper, we have proposed an Incremental Sequential Pattern Tree mining algorithm to retrieve new updated frequent sequential patterns from dynamic sequence database. Sequential Pattern Tree stores...

Pattern of Epistaxis of Patients Attending in A Tertiary Care Hospital of Tripura, Northeastern Region of India

Epistaxis is one of the most frequently encountered emergencies reported to occur in up to 60% of the general population. It has a bimodal age presentation with incidence peaks in below 25 years and above 50 years of age...

 Mining Top-k Closed Sequential Patterns in Sequential Databases

 In data mining community, sequential pattern mining has been studied extensively. Most studies require the specification of minimum support threshold to mine the sequential patterns. However, it is difficult &nbs...

 http://publishers.indexcopernicus.com/edit_journal_listissues.php

 Abstract : The emerging ultra wideband (UWB) system offers a great potential for the design of high speed short-range wireless communications. In order to satisfy the growing demand for higher data rates, one possi...

Download PDF file
  • EP ID EP131056
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Hemlata Sharma (2013).  Secure Image Hiding Algorithm using Cryptography and Steganography. IOSR Journals (IOSR Journal of Computer Engineering), 13(5), 1-6. https://europub.co.uk/articles/-A-131056