Design of Image Steganography using Asymmetric Key Cryptography
G. Divya Sri1 , A. Ramani2 , A. Jhansi Priya3 , B. Santhi4 , SK. Wasim Akram5
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 19-22, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.1922
Online published on Mar 31, 2019
Copyright © G. Divya Sri, A. Ramani, A. Jhansi Priya, B. Santhi, SK. Wasim Akram . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: G. Divya Sri, A. Ramani, A. Jhansi Priya, B. Santhi, SK. Wasim Akram, “Design of Image Steganography using Asymmetric Key Cryptography,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.19-22, 2019.
MLA Style Citation: G. Divya Sri, A. Ramani, A. Jhansi Priya, B. Santhi, SK. Wasim Akram "Design of Image Steganography using Asymmetric Key Cryptography." International Journal of Computer Sciences and Engineering 7.3 (2019): 19-22.
APA Style Citation: G. Divya Sri, A. Ramani, A. Jhansi Priya, B. Santhi, SK. Wasim Akram, (2019). Design of Image Steganography using Asymmetric Key Cryptography. International Journal of Computer Sciences and Engineering, 7(3), 19-22.
BibTex Style Citation:
@article{Sri_2019,
author = {G. Divya Sri, A. Ramani, A. Jhansi Priya, B. Santhi, SK. Wasim Akram},
title = {Design of Image Steganography using Asymmetric Key Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {19-22},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3789},
doi = {https://doi.org/10.26438/ijcse/v7i3.1922}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.1922}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3789
TI - Design of Image Steganography using Asymmetric Key Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - G. Divya Sri, A. Ramani, A. Jhansi Priya, B. Santhi, SK. Wasim Akram
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 19-22
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
839 | 697 downloads | 257 downloads |
Abstract
Technological advancements and the usage of internet have been increasing very rapidly in the modern society from day to day. These advancements are leading to many security threats and security issues. There is a need to provide security to confidential information which has been a major concern from the past to the present times. In order to arrest all these security challenges a novel approach has been provided using Steganography and Cryptography through which data security and confidentiality can be ensured. Steganography deals about hiding the data within an image, audio or video file whereas Cryptography is all about transforming the data into unreadable format. In the proposed system the secret message is encrypted using RSA and Column Transposition technique. Later the encrypted message is embedded into the image using the LSB technique. Whenever the combination of Cryptography and Steganography have been used then the level of security has been increased rather than using the Steganography alone.
Key-Words / Index Term
Steganography, Cryptography, Encryption, Decryption, Public key, Private key
References
[1] Swati Nimje, Amruta Belkhede, Gaurav Chaudhari, Akanksha Pawar and Kunali Kharbikar,"Hiding Existence of Communication Using Image Steganography " in International Journal of Computer Science and Engine and Engineering(IJCSE), Volume-2, Issue-3 ,E-ISSN: 2347-2693.Mar-2014.
[2] Unik Lokhande, A.K.Gulve “Steganography using Cryptography and Pseudo Random Numbers” in an International Journal of Computer Applications (0975 – 8887) Volume 96– No.19, June 2014 .
[3] M. S. Sutaone,M.V. Khandare,"Image Based Steganography Using LSB Insertion Technique" in 2008 IET International Conference on Wireless, Mobile and Multimedia Networks.
[4] Arati Appaso Pujari,Sunita Sunil Shinde,"Data Security using Cryptography and Steganography" in IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 130-139.
[5] Pooja Rani, Mrs. Preeti Sharma,"Cryptography Using Image Steganography" in an International Journal of Computer Science and Mobile Computing, Vol.5 Issue.7, July- 2016, pg. 451-456.
[6] Miftah Ul Uroos, Sukhvinder Kaur ,Muheet Ahmed Butt , “Steganography: A Comparative Survey Conducted on Digital Images” in IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 10 (October. 2018), ||V (I) || PP 52-61 .
[7] Sneha Arora, Sanyam Anand “A Proposed Method for Image Steganography using Edge Detection” in an International Journal of Engineering Sciences, Issue June 2013, Vol. 8.
[8] Shamim Ahmed Laskar, Kattamanchi Hemachandran ,“High Capacity data hiding using LSB Steganography and Encryption” in an International Journal of Database Management Systems(IJDMS) Vol.4, No.6, December 2012.