Image Security Implementing Steganography and Cryptographic Methods
A. Balasubramani1 , Ch.D.V. Subba Rao2
- Faculty Of Computer Science & Engineering, Svpcet, Puttur.
- S.V.U.College Of Engineering, S.V.University, Tirupati.
Correspondence should be addressed to: balunbkr@yahoo.co.in.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-1 , Page no. 275-279, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.275279
Online published on Jan 31, 2018
Copyright © A. Balasubramani, Ch.D.V. Subba Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A. Balasubramani, Ch.D.V. Subba Rao, “Image Security Implementing Steganography and Cryptographic Methods,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.275-279, 2018.
MLA Style Citation: A. Balasubramani, Ch.D.V. Subba Rao "Image Security Implementing Steganography and Cryptographic Methods." International Journal of Computer Sciences and Engineering 6.1 (2018): 275-279.
APA Style Citation: A. Balasubramani, Ch.D.V. Subba Rao, (2018). Image Security Implementing Steganography and Cryptographic Methods. International Journal of Computer Sciences and Engineering, 6(1), 275-279.
BibTex Style Citation:
@article{Balasubramani_2018,
author = {A. Balasubramani, Ch.D.V. Subba Rao},
title = {Image Security Implementing Steganography and Cryptographic Methods},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {275-279},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1669},
doi = {https://doi.org/10.26438/ijcse/v6i1.275279}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.275279}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1669
TI - Image Security Implementing Steganography and Cryptographic Methods
T2 - International Journal of Computer Sciences and Engineering
AU - A. Balasubramani, Ch.D.V. Subba Rao
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 275-279
IS - 1
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
564 | 280 downloads | 254 downloads |
Abstract
Steganography is that the art of concealment the actual fact communication is going down, by concealment info in other info. Many different carrier file formats can be used, but digital pictures are the foremost well-liked because of their frequency on the web. This paper introduces 2 new strategies wherever in cryptography and steganography are combined to encode the information as well on hide the information in another medium through image process. This paper securing the image by encryption is finished by DES formula victimisation the key image. The encrypted image may be hide in another image by victimisation LSB techniques, so that the secret’s terribly existence is hid. The coding may be done by the same key image victimisation DES formula.
Key-Words / Index Term
Steganography, Cryptography, image hiding, Least-significant bit(LSB) scheme
References
[1] C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8 Annual Computer Security Applications Conference, 30 Nov-4 Dec, 1992, pp. 153- 159.
[2] J.C. Judge, Steganography: Past, present, future. SANS Institute publication,http://www.sans.org/reading_room/ whitepapers/stenganography/552.php, 2001.
[3] Km. Pooja ,Arvind Kumar , “Steganography- A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9– No.7, November 2010.
[4] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) 2634.
[5] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32-44.
[6] N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[7] P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083-
2126.
[8] R. Chandramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “ , International Workshop on DigitalWatermarking, Seoul, October 2004.
[9] R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications,
16(4), pp. 474-481.
[10] S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23,
2004, pp. 417-418.
[11] T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA