Image Steganography-Hiding Data within Image
Esha Deshmukh1 , Juily Dangle2 , Sagar Ghadi3 , Shailesh Kewat4 , Kalpana Shewale5
Section:Research Paper, Product Type: Journal Paper
Volume-05 ,
Issue-01 , Page no. 4-12, Jun-2017
Online published on May 31, 2017
Copyright © Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat , Kalpana Shewale . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat , Kalpana Shewale, “Image Steganography-Hiding Data within Image,” International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.4-12, 2017.
MLA Style Citation: Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat , Kalpana Shewale "Image Steganography-Hiding Data within Image." International Journal of Computer Sciences and Engineering 05.01 (2017): 4-12.
APA Style Citation: Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat , Kalpana Shewale, (2017). Image Steganography-Hiding Data within Image. International Journal of Computer Sciences and Engineering, 05(01), 4-12.
BibTex Style Citation:
@article{Deshmukh_2017,
author = {Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat , Kalpana Shewale},
title = {Image Steganography-Hiding Data within Image},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {05},
Issue = {01},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {4-12},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=177},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=177
TI - Image Steganography-Hiding Data within Image
T2 - International Journal of Computer Sciences and Engineering
AU - Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat , Kalpana Shewale
PY - 2017
DA - 2017/05/31
PB - IJCSE, Indore, INDIA
SP - 4-12
IS - 01
VL - 05
SN - 2347-2693
ER -
Abstract
Security of the data is of foremost important in today’s world. Security has become a main important field in information and communication technology. For highly secure, hidden communication and sharing of information steganography is used. Steganography is a method of hiding the existence of communication, by hiding information data in other carriers. Different carrier mediums can be used for this, but digital images are the most famous because of their frequent use on the internet. There are several techniques of steganography, among them some are too complicated than others. Every technique have their strong and weak parameters. LSB, DES and AES algorithm is been used in this project. LSB technique is simple, high payload, low complexity and easy to detect. AES and DES are the complex technique but provide high security. The execution time of LSB is more, DES moderate and AES takes less time. Using these three methods we are going to design our project. This will enhance the security of the data which is being transferred.
Key-Words / Index Term
Steganography, stego-key, AES, DES, LSB
References
[1] X. Zhou, W. Gong, W. Fu, L. Jing “An Improved Method for LSB based colour Image Steganography Combined with Cryptography”, Jin. Information Engineering School, Communication University of China,CUC. 15TH International confrence on Computer and Information Science(ICIS), 2016
[2] L. Randa and P. Saxena, “Security Improvisation in Image Steganography using DES”, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET). Volume 3 Issue 7, July 2014.
[3] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 663-666.
[4] D. Selent, “Advanced Encryption Standard”, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[5] B. Li, J. He, J. Huang, Y.Qi. Shi. “A survey on Image steganography and steganalysis”, Volume 2, Number 2, April 2011.
[6] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric AES algorithm," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, 2016, pp. 1-5.
doi: 10.1109/CDAN.2016.7570921
[7] S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, "Hiding Existence of Communication Using Image Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.163-166, 2014.
[8] C.R. Gaidhani, V.M. Deshpande, V.N. Bora, "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.67-70, 2014.
[9] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[10] S. Singh and V.K. Attri, “Dual Layer Security of data using LSB Image Steganography Method and AES Encryption ”, ISSN: 2231-2307, Volume-2, Issue-3, July 2015.
[11] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
[12] Rajesh Shah and Yashwant Singh Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.