Open Access   Article Go Back

Encrypting Secret Information inside an Image Using Steganography

Udita Bhardwaj1 , Vikas Singhal2 , Shivani Dubey3

  1. Greater Noida Institute of Technology, Greater Noida, India.
  2. Greater Noida Institute of Technology, Greater Noida, India.
  3. Greater Noida Institute of Technology, Greater Noida, India.

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-1 , Page no. 11-13, Jan-2023

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v11i1.1113

Online published on Jan 31, 2023

Copyright © Udita Bhardwaj, Vikas Singhal, Shivani Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Udita Bhardwaj, Vikas Singhal, Shivani Dubey, “Encrypting Secret Information inside an Image Using Steganography,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.1, pp.11-13, 2023.

MLA Style Citation: Udita Bhardwaj, Vikas Singhal, Shivani Dubey "Encrypting Secret Information inside an Image Using Steganography." International Journal of Computer Sciences and Engineering 11.1 (2023): 11-13.

APA Style Citation: Udita Bhardwaj, Vikas Singhal, Shivani Dubey, (2023). Encrypting Secret Information inside an Image Using Steganography. International Journal of Computer Sciences and Engineering, 11(1), 11-13.

BibTex Style Citation:
@article{Bhardwaj_2023,
author = {Udita Bhardwaj, Vikas Singhal, Shivani Dubey},
title = {Encrypting Secret Information inside an Image Using Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2023},
volume = {11},
Issue = {1},
month = {1},
year = {2023},
issn = {2347-2693},
pages = {11-13},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5539},
doi = {https://doi.org/10.26438/ijcse/v11i1.1113}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i1.1113}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5539
TI - Encrypting Secret Information inside an Image Using Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Udita Bhardwaj, Vikas Singhal, Shivani Dubey
PY - 2023
DA - 2023/01/31
PB - IJCSE, Indore, INDIA
SP - 11-13
IS - 1
VL - 11
SN - 2347-2693
ER -

VIEWS PDF XML
189 301 downloads 113 downloads
  
  
           

Abstract

Converting information into the image format has become the latest method which can be implemented for encrypting information into colours. Experts have projected different methods to implement this approach to secure data against hackers. Most of the approaches square measuring readily implemented algorithms or putting forward an easy level of the coding execution which makes these methods a risk to break by attackers. A new and emerging method of operations is discussed through this paper so as to build a word-To-picture encrypting approach. The substitution and transposition operations square measure applied into two levels ((characters (bytes) and bits) of the written information to formulate the secret and safe image. Together the given functions provide lots of strength points to fight against hackers. The projected method has been applied and verified across various sets of information; the recorded observations proved the efficiency and correctness of the methodology as an efficient Text-To-Image encrypting approach.

Key-Words / Index Term

Encryption, Cryptography, Stegnography

References

[1]A. Abusukhon, "Block Cipher Encryption for Text-To-Image Algorithm". International Journal of Computer Engineering and Technology (IJCET), Vol.4, Issue.3, 2013.
[2]A. Abusukhon, M. Talib, and H. Almimi, "Distributed Text-to-Image Encryption Algorithm". International Journal of Computer Applications, Vol. 106, No. 1, 2014.
[3]M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.). Premier Reference Source– Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, pp.438-450, 2008.
[4]D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information ? hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, pp.438-450, 2008.
[5]Morkel T. , Eloff J.H.P. , M.S. Olivier, "An overview f image???? steganography", http://mo.co.za/openistegoverview.pdf, on January 2009.
[6]Diop, S .M Farssi, O. Khouma, H. B Diouf, K .Tall, and K .Sylla, “New Steganographic scheme based of Reed-Solomon codes, International Journal of Distributed and Parallel Systems (IJDPS)”, Vol.3, Issue.2, 2012.
[7] M. Sutaone and M. Khandare, “Image based steganography using LSB insertion technique”, in Conference on Wireless, Mobile and Multimedia Networks, 2008. IET International, Beijing, pp.146 – 151, 2008.
[8] N. F. Johnson and S. Jajodia, “Exploring steganography, seeing the unseen”, IEEE Computer Magazine, Vol.31, Issue.2, pp.26-34, 1998.