Steganography with Cryptography Technique For Data Hiding

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1

Abstract

"Now a day’s sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. In steganography nothing but the concealed communication which is prefers for secure our data from unauthorized person. In this technique secret information can be replaced or conceal behind the cover information unsuspicious. Cryptography is the technique, where secret information is replaced in unreadable format. The present work is focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encrypted algorithm in cryptography. Secondly the encrypted data must be hidden in an image or video or an audio file with help of steganographic algorithm. Thirdly by using decryption technique the receiver can view the original data from the hidden image or video or audio file. Transmitting data or document can be done through these ways will be secured. In this paper we implemented three encrypt techniques like RSA algorithm along with steganographic algorithm like LSB substitution technique."

Authors and Affiliations

Keywords

Related Articles

Online Virtual Subjective Examination System Based Under Ubiquitous Cloud

"With the advancement in the field of information and communication technology, must change in the traditional examination system. Today, the online examination conducted is for an objective phase, but no provision is th...

Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping

Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping

Current Status of e-Agriculture and Global Trends: A Survey Conducted in TransNzoia County, Kenya

Information Technology (IT) has long been viewed as having great potential for improving decision making in agriculture. In all phases of the agricultural industry, information technologies are vital to the management an...

Studies on Grain Yield Components in NPT Lines of Rice to Develop Super Rice Hybrid

Combining ability in NPT lines of rice for Super hybrid rice breeding programme has been carried out in line x tester mating design involving 3 stable CMS lines and well adapted 9 testers of different eco-geographic orig...

A Secured and Authenticated Mechanism for Data Deduplication using Hybrid Clouds

Data de-duplication is a technique for reducing the amount of storage space an organization needs to save its data. In most organizations, the storage systems contain duplicate copies of many pieces of data. For example,...

Download PDF file
  • EP ID EP341669
  • DOI -
  • Views 71
  • Downloads 0

How To Cite

(2015). Steganography with Cryptography Technique For Data Hiding. UNKNOWN, 4(1), -. https://www.europub.co.uk/articles/-A-341669