Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Securing Information Using Cryptography and Steganography Technique


Affiliations
1 Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College (Autonomous), Tirupathi, India
     

   Subscribe/Renew Journal


Present day’s communication became the one of the major criteria for a human being. While communication the information should be send in such a way that the third part or an unauthorized user should not be able to know what the parties are communicating. For this, Internet is the source of communication. In Internet the data will be transferred in covert channel. Here it will be difficult to provide security for the channel, so the security is provided for the information than the channel. Now the task is to provide the security to the information. Cryptography and steganography are the techniques used to convert the secret information into an unreadable format and this data can be embedded into an image respectively. By using only cryptography the intruder can get back the original message if the key is known, to avoid this, by introducing Steganography over cryptography the secret message cannot be straight forwardly decrypted because, the data is embedding into a cover image, Nemours techniques are available in which Least Significant Bit insertion is one of the best techniques because it produces less noise in stego-image when compared to other techniques. Using Diffie Hellman algorithm the data is encrypted.

Keywords

Steganography, Cryptography, Information Hiding, Least Significant Bit Insertion, Diffie Hellman, Pseudo Random Number Generator (PRNG).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 217

PDF Views: 2




  • Securing Information Using Cryptography and Steganography Technique

Abstract Views: 217  |  PDF Views: 2

Authors

V. Hemanth
Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College (Autonomous), Tirupathi, India
Mahammad Shareef
Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College (Autonomous), Tirupathi, India

Abstract


Present day’s communication became the one of the major criteria for a human being. While communication the information should be send in such a way that the third part or an unauthorized user should not be able to know what the parties are communicating. For this, Internet is the source of communication. In Internet the data will be transferred in covert channel. Here it will be difficult to provide security for the channel, so the security is provided for the information than the channel. Now the task is to provide the security to the information. Cryptography and steganography are the techniques used to convert the secret information into an unreadable format and this data can be embedded into an image respectively. By using only cryptography the intruder can get back the original message if the key is known, to avoid this, by introducing Steganography over cryptography the secret message cannot be straight forwardly decrypted because, the data is embedding into a cover image, Nemours techniques are available in which Least Significant Bit insertion is one of the best techniques because it produces less noise in stego-image when compared to other techniques. Using Diffie Hellman algorithm the data is encrypted.

Keywords


Steganography, Cryptography, Information Hiding, Least Significant Bit Insertion, Diffie Hellman, Pseudo Random Number Generator (PRNG).