Encrypting Secret Information inside an Image Using Steganography
Udita Bhardwaj1 , Vikas Singhal2 , Shivani Dubey3
- Greater Noida Institute of Technology, Greater Noida, India.
- Greater Noida Institute of Technology, Greater Noida, India.
- Greater Noida Institute of Technology, Greater Noida, India.
Section:Research Paper, Product Type: Journal Paper
Volume-11 ,
Issue-1 , Page no. 11-13, Jan-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i1.1113
Online published on Jan 31, 2023
Copyright © Udita Bhardwaj, Vikas Singhal, Shivani Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Udita Bhardwaj, Vikas Singhal, Shivani Dubey, “Encrypting Secret Information inside an Image Using Steganography,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.1, pp.11-13, 2023.
MLA Style Citation: Udita Bhardwaj, Vikas Singhal, Shivani Dubey "Encrypting Secret Information inside an Image Using Steganography." International Journal of Computer Sciences and Engineering 11.1 (2023): 11-13.
APA Style Citation: Udita Bhardwaj, Vikas Singhal, Shivani Dubey, (2023). Encrypting Secret Information inside an Image Using Steganography. International Journal of Computer Sciences and Engineering, 11(1), 11-13.
BibTex Style Citation:
@article{Bhardwaj_2023,
author = {Udita Bhardwaj, Vikas Singhal, Shivani Dubey},
title = {Encrypting Secret Information inside an Image Using Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2023},
volume = {11},
Issue = {1},
month = {1},
year = {2023},
issn = {2347-2693},
pages = {11-13},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5539},
doi = {https://doi.org/10.26438/ijcse/v11i1.1113}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i1.1113}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5539
TI - Encrypting Secret Information inside an Image Using Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Udita Bhardwaj, Vikas Singhal, Shivani Dubey
PY - 2023
DA - 2023/01/31
PB - IJCSE, Indore, INDIA
SP - 11-13
IS - 1
VL - 11
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
189 | 301 downloads | 113 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
Converting information into the image format has become the latest method which can be implemented for encrypting information into colours. Experts have projected different methods to implement this approach to secure data against hackers. Most of the approaches square measuring readily implemented algorithms or putting forward an easy level of the coding execution which makes these methods a risk to break by attackers. A new and emerging method of operations is discussed through this paper so as to build a word-To-picture encrypting approach. The substitution and transposition operations square measure applied into two levels ((characters (bytes) and bits) of the written information to formulate the secret and safe image. Together the given functions provide lots of strength points to fight against hackers. The projected method has been applied and verified across various sets of information; the recorded observations proved the efficiency and correctness of the methodology as an efficient Text-To-Image encrypting approach.
Key-Words / Index Term
Encryption, Cryptography, Stegnography
References
[1]A. Abusukhon, "Block Cipher Encryption for Text-To-Image Algorithm". International Journal of Computer Engineering and Technology (IJCET), Vol.4, Issue.3, 2013.
[2]A. Abusukhon, M. Talib, and H. Almimi, "Distributed Text-to-Image Encryption Algorithm". International Journal of Computer Applications, Vol. 106, No. 1, 2014.
[3]M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.). Premier Reference Source– Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, pp.438-450, 2008.
[4]D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information ? hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, pp.438-450, 2008.
[5]Morkel T. , Eloff J.H.P. , M.S. Olivier, "An overview f image???? steganography", http://mo.co.za/openistegoverview.pdf, on January 2009.
[6]Diop, S .M Farssi, O. Khouma, H. B Diouf, K .Tall, and K .Sylla, “New Steganographic scheme based of Reed-Solomon codes, International Journal of Distributed and Parallel Systems (IJDPS)”, Vol.3, Issue.2, 2012.
[7] M. Sutaone and M. Khandare, “Image based steganography using LSB insertion technique”, in Conference on Wireless, Mobile and Multimedia Networks, 2008. IET International, Beijing, pp.146 – 151, 2008.
[8] N. F. Johnson and S. Jajodia, “Exploring steganography, seeing the unseen”, IEEE Computer Magazine, Vol.31, Issue.2, pp.26-34, 1998.