![]() |
10.5120/17547-8143 |
Nesir Rasool Mahmood, Ali Abdul Azeez Mohammad and Zahraa Nesir Rasool. Article: Public Key Steganography. International Journal of Computer Applications 100(8):29-32, August 2014. Full text available. BibTeX
@article{key:article, author = {Nesir Rasool Mahmood and Ali Abdul Azeez Mohammad and Zahraa Nesir Rasool}, title = {Article: Public Key Steganography}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {100}, number = {8}, pages = {29-32}, month = {August}, note = {Full text available} }
Abstract
In this paper, a new method will be introduced for hiding information in images by using a public key method for ciphering the text before hiding information as well as this public key will be used in determining the position where the information will be hidden by using the last position in finding the new position, symmetric key also will be used in hiding process for deciding the number of bits that will be used from each pixel in the image, the combination of steganography and cryptography provide much strong method for keeping information secured and undiscovered from unwanted persons.
References
- Michael Backes, and Christian Cachin " Public-Key Steganography with Active Attacks ", Switzerland, 2004.
- F´abio Borges, Renato Portugal, and Jauvane Oliveira " Steganography with Public-Key Cryptography for Videoconference ", National Laboratory of Scientific Computing, 2007.
- Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee and Poulami Das "A Tutorial Review on Steganography", University of Calcutta, 2008.
- Shahana T "A Secure DCT Image Steganography based on Public-Key Cryptography ", India, 2013.
- Ms. Priyanka P. Palsaniya, and Mr. Pravin D. Soni " CryptoSteganography:Security Enhancement by using Efficient Data Hiding Techniques", India, 2014.