Steganography with Cryptography Technique For Data Hiding

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

"Now a day’s sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. In steganography nothing but the concealed communication which is prefers for secure our data from unauthorized person. In this technique secret information can be replaced or conceal behind the cover information unsuspicious. Cryptography is the technique, where secret information is replaced in unreadable format. The present work is focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encrypted algorithm in cryptography. Secondly the encrypted data must be hidden in an image or video or an audio file with help of steganographic algorithm. Thirdly by using decryption technique the receiver can view the original data from the hidden image or video or audio file. Transmitting data or document can be done through these ways will be secured. In this paper we implemented three encrypt techniques like RSA algorithm along with steganographic algorithm like LSB substitution technique."

Authors and Affiliations

Keywords

Related Articles

Security Threats and Solution in Wireless Sensor Networks

The Wireless Sensor Network (WSN) increasingly becoming more practicable solution to many challenging applications. One of the major applications of the sensor networks is in military. So providing security is particular...

‘ICT-Periodism’ in the Classroom: Lessons Learnt from English in Action

This paper illustrates the factors affecting the use of ICT in the classroom in a large scale language development project in Bangladesh. The project, called English in Action (EIA) provides ICT materials along with prin...

Localization Technique in Wireless Sensor Network

:. Localization is a fundamental issue of wireless sensor networks. Localization in wide areas remains very challenging due to various interfering factors. Combined & Differentiated Localization approach that exploits th...

A Comparative Study of Binary Mixture of di-n -Butyl Phthalate (DBP) with Polar and Non Polar Liquid

A comparative study of binary mixture of Di-n-butyl phthalate (DBP) with polar liquid (aniline, nitrobenzene) and a non polar liquid (benzene, toluene) is carried out at 1MHz frequency and temperature 308K. The ultrasoni...

Image Enhancement Techniques in Spatial Domain with Visual Data Mining

"Most Image enhancement System deployed in real world applications are unimodal. i.e., they rely on the evidence of a single source of information. These limitations are addressed by multimodal image verification system...

Download PDF file
  • EP ID EP341669
  • DOI -
  • Views 54
  • Downloads 0

How To Cite

(2015). Steganography with Cryptography Technique For Data Hiding. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-341669