We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Public Key Steganography

by Nesir Rasool Mahmood, Ali Abdul Azeez Mohammad, Zahraa Nesir Rasool
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 8
Year of Publication: 2014
Authors: Nesir Rasool Mahmood, Ali Abdul Azeez Mohammad, Zahraa Nesir Rasool
10.5120/17547-8143

Nesir Rasool Mahmood, Ali Abdul Azeez Mohammad, Zahraa Nesir Rasool . Public Key Steganography. International Journal of Computer Applications. 100, 8 ( August 2014), 29-32. DOI=10.5120/17547-8143

@article{ 10.5120/17547-8143,
author = { Nesir Rasool Mahmood, Ali Abdul Azeez Mohammad, Zahraa Nesir Rasool },
title = { Public Key Steganography },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 8 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number8/17547-8143/ },
doi = { 10.5120/17547-8143 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:29:27.518042+05:30
%A Nesir Rasool Mahmood
%A Ali Abdul Azeez Mohammad
%A Zahraa Nesir Rasool
%T Public Key Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 8
%P 29-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new method will be introduced for hiding information in images by using a public key method for ciphering the text before hiding information as well as this public key will be used in determining the position where the information will be hidden by using the last position in finding the new position, symmetric key also will be used in hiding process for deciding the number of bits that will be used from each pixel in the image, the combination of steganography and cryptography provide much strong method for keeping information secured and undiscovered from unwanted persons.

References
  1. Michael Backes, and Christian Cachin " Public-Key Steganography with Active Attacks ", Switzerland, 2004.
  2. F´abio Borges, Renato Portugal, and Jauvane Oliveira " Steganography with Public-Key Cryptography for Videoconference ", National Laboratory of Scientific Computing, 2007.
  3. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee and Poulami Das "A Tutorial Review on Steganography", University of Calcutta, 2008.
  4. Shahana T "A Secure DCT Image Steganography based on Public-Key Cryptography ", India, 2013.
  5. Ms. Priyanka P. Palsaniya, and Mr. Pravin D. Soni " CryptoSteganography:Security Enhancement by using Efficient Data Hiding Techniques", India, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography public key cipher hiding cryptography