A Smart Strategy for Data Hiding using Cryptography and Steganography

نویسندگان

چکیده

Confidential data maintained by Security sources has always been a substantial aspect of hampering unintended access. Technology is enhancing day towards information, especially in terms multimedia file transmission. Combining cryptography and steganography, crossover approach serves information security. Cryptography strategy for changing over from plain content Cipher Text. Steganography the specialty concealing text, which refers to hiding within message or file. The proposed method provides hybrid system designing utilizing steganography techniques, making communication reliable resisting attacks. In this paper, play fair cipher used encode hidden textual content, security effective level. Play represents text as unit converts these units into unknown forms. Later, Discrete Cosine Transform (DCT) Logical Operation Exclusive OR (XOR) techniques were combined with masking encrypted messages inside picture. Noble level results histogram analysis are achievements' values that indicate offers designed system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to h...

متن کامل

Proposed System for Data Hiding Using Cryptography and Steganography

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to h...

متن کامل

Medical Image Protection by Using Cryptography Data-Hiding and Steganography

This paper presents protecting the transmission of medical images. The presented algorithms will be applied to images.This work presents a new method that combines image cryptography, data hiding and Steganography technique for denoised and safe image transmission purpose. In This method we encrypt the original image with stream cipher algorithm then embed the encrypted image with patient infor...

متن کامل

Information Hiding Using Least Significant Bit Steganography and Cryptography

Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the ...

متن کامل

LSB Based Steganography using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission

A large number of commercial steganographic programs use the Least Significant Bit(LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity. Although there has been an extensive research work in the past, but majority of the work has no much optimal consideration for robust security towards the encrypted image. The proposed system p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Scientific & Industrial Research

سال: 2023

ISSN: ['0022-4456']

DOI: https://doi.org/10.56042/jsir.v82i05.1090