MODIFIED APPROACH USING LSB IN IMAGE STEGANOGRAPHY

Authors

  • Navjot Kaur Mtech Student, GurukulVidyapeeth Institute of Engg and Technology, Banur, Punjab, INDIA
  • Manpreet Singh Assistant Professor, GurukulVidyapeeth Institute of Engg and Technology, Banur, Punjab, INDIA

DOI:

https://doi.org/10.29121/granthaalayah.v3.i5.2015.3018

Keywords:

Steganography, Cryptography, Stego image, Cover Image And N-Queen Algorithm

Abstract [English]

Steganography is a profession of masking the secret information using some other harmless message. One needs to be very careful while sharing any information on public network as there are more chances of an intrusion. Therefore the art of covering information is highly in demand known as Steganography. To satisfy the need of safe transmission, many known techniques like modern data compression, information theory, spread spectrum, and cryptography technologies were integrated to bring up Steganography. This paper proposed an approach of building a secure data hiding technique using Cryptography and Steganography which assures high secrecy of data over network.

Downloads

Download data is not yet available.

References

A.K. Al Frajat ”Hiding data in video file An overview”, Journal of applied sciences 10(15):1644-1649, 2010. DOI: https://doi.org/10.3923/jas.2010.1644.1649

Ali K Hmood ”An overview on hiding information technique in images” Journal of applied sciences 10(18)2094-2100, 2010. DOI: https://doi.org/10.3923/jas.2010.2094.2100

NiuJiping, ”Image encryption algorithm based on rijndael S-boxes” in IEEE applied International conference on computational intelligence and security 978-0-7695-3508-18, 2008.

B. Subramanan “Image encryption based on aes key expansion” in IEEE applied second international conference on emerging application of information technology, 978-0-7695-4329-1/11, 2011.

Punitameelu “AES Asymmetric key cryptographic system”

in international journal of information technology and knowledge management, volume 4, 113-117, 2011.

Saurabhsingh “Hiding Image to Video” International Journal of engineering science & technology Vol. 2(12), 6999-7003 ,2010.

MarghnyMohamed”Data hiding by LSB substitution using genetic optimal key permutation ” in International arab journal of e-technology ,vol.2,no 1,11-17, January 2011.

P.Karthigaikumar “Simulation of image encryption using AES algorithm”IJCA special issue on computer science New dimensions &perspectives, 166-172, 2011.

M.Wu, Hiding in image and video Part I fundamental issues and solutions ,IEEE Trans Image processing,12(6):685-686, 2005. DOI: https://doi.org/10.1109/TIP.2003.810588

M.Wu ,E. Tang and B.Liu,”Data hiding in digital binary image ,”in IEEE ICME New York City, NY,USA ,July 2000.

J.L. Rodgers, J. L. and W.A. Nicewander, “Thirteen Ways to Look at the Correlation Coefficient”, American Statistician 42, 59-66 ,1995. DOI: https://doi.org/10.1080/00031305.1988.10475524

Liu bin, Li zhitang, Li Yao an Image method based on correlation analysis and image fusion”, International conference on parallel and distributed computing, Application and technology 0-7695-2405-2/05 ,2005. DOI: https://doi.org/10.1109/PDCAT.2005.82

P.Mohan Kumar and K.L.Shunmuganathan “A New approach for hiding data in images using image domain method” in International Journal of computer and internet security ISSN 0974-2247 volume 3 ,number PP 69-80, 2011

Downloads

Published

2015-05-31

How to Cite

Kaur, N., & Singh, M. (2015). MODIFIED APPROACH USING LSB IN IMAGE STEGANOGRAPHY. International Journal of Research -GRANTHAALAYAH, 3(5), 88–94. https://doi.org/10.29121/granthaalayah.v3.i5.2015.3018