International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 3 | Year 2012 | Article Id. IJETT-V3I1P221 | DOI : https://doi.org/10.14445/22315381/IJETT-V3I1P221

Image Security Using Steganography And Cryptographic Techniques


R.Nivedhitha , Dr.T.Meyyappan

Citation :

R.Nivedhitha , Dr.T.Meyyappan, "Image Security Using Steganography And Cryptographic Techniques," International Journal of Engineering Trends and Technology (IJETT), vol. 3, no. 3, pp. 366-371, 2012. Crossref, https://doi.org/10.14445/22315381/IJETT-V3I1P221

Abstract

Steganography is the art of hiding the fact communication is taking place, by hiding information in other information.Many different carrier file formats can be used,but digital images are the most popular because of their frequency on the internet.This paper introduces two new methods where in cryptography and steganography are combined to encrypt the data as well as to hide the data in another medium through image processing . This paper secur ing the image by encryption is done by DES algorithm using the key image. The encrypted image can be hide in another image by using LSB techniques,so that the secret’s very existence is concealed. The decryption can be done by the same key image using DES algorithm.


Keywords

Steganography, Cryptography, image hiding, least - significant bit(LSB) method

References

[1] C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IE EE 8 Annual Computer Security Applications Conference, 30 Nov - 4 Dec, 1992, pp. 153 - 159.
[2] J.C. Judge, Steganography: Past, present, future. SANS Institute publication, http://www.sans.org/reading_room/whitepapers/stenganography/55 2.php, 2001.
[3] K m. Pooja ,Arvind Kumar , “Steganography - A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9 – No.7, November 2010.
[4] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Compu ter, 31(2)(1998) 2634.
[5] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32 - 44.
[6 ] N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisse r and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[7] P. Moulin and R. Koetter, Data - hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083 - 2126.
[8] R. Chan dramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “ , International Workshop on DigitalWatermarking, Seoul, October 2004.
[9] R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IE EE Journal Selected Areas in Communications, 16(4), pp. 474 - 481.
[10] S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19 - 23, 2004, pp. 417 - 418.
[11] T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pret oria, SA.
[12 ]Hide & Seek: An Introduction to Stegnography:http: niels.xtdnet.nl/papers/pratical.pdf.
[13] KafaRabah. Steganography - The Art of Hiding Data. Information technology Journal 3 (3) - 2004

Time: 0.0013 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB