DATA HIDING IN IMAGE USING CRYPTOGRAPHY AND STEGANOGRAPHY: AN INVESTIGATION
Main Article Content
Abstract
Cryptography is the art dealt with the converting a confidential information into inaudible forms. This unintelligible information might engender distrustful in the mind of opponents when it transfers on insecure communication media and only valid recipient can only by decoding it. Conversely, Steganography embed confidential information in to a cover image and hides its subsistence. As a mundane hiding of secrete data is apply in communication on text, image or multimedia contents digital signature and authentication.
Mutually Cryptographic and Steganographic methods distributes the satisfactory security but are vulnerable to attackers when information flow over insecure communication media. Efforts to amalgamate these techniques i.e. Steganography and Cryptography, gives the ultimate results in security improvement. The steganographic techniques currently used mainly accentuation on embedding mechanism with less consideration to pre-processing of confidential information. The advantage of pre-processing offer robustness, high security level and flexibility in the safety system
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
N. Provos and P. Honeyman, “Hide and Seek: an Introduction to Steganographyâ€, IEEE Security and Privacy Vol 1 No. 3, pp.32–44, 2003.
Ross J. Anderson and Fabien A.P. Petitcolas, “On The Limits of Steganographyâ€, IEEE Journal of Selected Areas in Communications, Vol. 16 No. 4,pp 474-481, May 1998.
J.C.Judge, “Steganography: past, present, futureâ€, SANS Institute publication, /http://www.sans.org/reading_room/whitepapers/stenganography/552.phpS, 2001.
Shouchao Song, Jie Zhang, Xin Liao, Jiao Du and Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptographyâ€, Advanced in Control Engineering and Information Science , Procedia Engineering 15 , pp. 2767 – 2772, 2011.
Ajit Singh and Swati Malik, “ Securing Data by Using Cryptography with Steganographyâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 5, pp 404-409 , May 2013.
Dhawal Seth, L. Ramanathan and Abhishek Pandey, “Security Enhancement: Combining Cryptography and Steganographyâ€, International Journal of Computer Applications (0975 – 8887) Volume 9– No.11, pp. 3-6, Nov 2010.
Khalil Challita and Hikmat Farhat, “Combining Steganography and Cryptography: New Directionsâ€, International Journal on New Computer Architectures and Their Applications (IJNCAA) Vol. 1 No., pp.199-208, 2011.
Ankit Uppal, Rajni Sehgal, Renuka Ngapal and Aakash Gupta, “Merging Cryptography& Steganography Combination of Cryptography: Rc6 Enhanced Ciphering and Steganography: JPEGâ€, International Journal of Advanced Computational Engineering and Networking, Vol. 2, Issue-10, pp. 85-87, Oct.-2014.
Dipti Kapoor Sarmah and Neha Bajpai, “Proposed System for Data Hiding Using Cryptographyand Steganographyâ€, International Journal of Computer Applications (0975 – 8887) Volume 8– No.9, pp. 7- 10, Oct 2010.
Pye Pye Aung and Tun Min Naing, “ Novel Secure Combination Technique of Steganography and Cryptographyâ€, International Journal of Information Technology, Modeling and Computing (IJITMC), Vol. 2, No. 1. Pp 55-62, February 2014.
William M. Daley and Raymond G. Kammer, “Data Encryption Standard (DES)â€, Federal Information Processing Standards Publication FIPS Pub 46-3 National Institute Of Standards And Technology, pp. 1-22, 25 October 1999.
Manoj Kumar Ramaiya, Naveen Hemrajani and Anil Kishore Saxena, “Improvisation of Security aspect in Steganography applying DES â€, IEEE International Conference on Communication Systems and Network Technologies (CSNT – 2013) , pp. 431 – 436, 2013.
Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganographyâ€, International Journal of Applied Science and Engineering 4, 3: 275-290, 2006.