Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 117 - Number 19
Year of Publication: 2015
Richa Singh
Amit Kumar Sharma

Richa Singh and Amit Kumar Sharma. Article: An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique. International Journal of Computer Applications 117(19):1-5, May 2015. Full text available. BibTeX

	author = {Richa Singh and Amit Kumar Sharma},
	title = {Article: An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {117},
	number = {19},
	pages = {1-5},
	month = {May},
	note = {Full text available}


Cryptography is the science and art of encrypting and decrypting text data where Steganography is the science and art of hiding information. Steganography deals with composing hidden message so that only the sender and receiver know that the message even exists. A novel approach i. e. CryptSteg is introduced where sender embedding text message in the picture and send it to the receiver. In this approach the algorithm of cryptography and Steganography is combined. Firstly the text message is encrypted and this encrypted message is then embedded in an image using a new Steganography algorithm. The image are partitioned in the ten level block, and the text data will be embedded into ten diagonal or linear sub block values which is depend upon key. The quality of produced image is better using the median filter while using this algorithm.


  • Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and Nii Narku Quaynor- " A New Cryptographic Encryption Algorithm for Securing Digital Images", International Journal of Computer Applications (0975 – 8887),Vol. no. 94 – No. 19, May 2014.
  • Andreas Westfeld and Andreas Pfitzmann, "Attacks on Steganographic Systems Breaking the Steganographic Utilities" EzStego,Jsteg,Steganos, and S-Tools—and Some Lessons Learned.
  • Sakthisudhan K. , Prabhu P. , Thangaraj P. , and "Secure Audio Steganography for Hiding Secret Information" International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012) Proceedings published in International Journal of Computer Applications® (IJCA).
  • Sharmah Deepti Kapoor, Bajpai Neha, "Proposed system for data hiding using cryptography and staganography", International Journal of Computer Applications (0975 – 8887) Volume 8– No. 9, October 2010.
  • Omolehin J. O, Abikoye O. C, Bahej A. O , "Time Complexity of 4 Row Rail Fence Cipher Encryption Algorithm", International Journal of Mathematical science, vol-1,nov-1,2009.
  • Anwar h. ibrahim, Waleed M. Ibrahim, "Text Hidden in Picture Using Steganography: Algorithms and Implications for Phase Embedding and Extraction Time", International Journal of Information Technology & Computer Science (IJITCS) (ISSN No: 2091-1610) Volume 7: No: 3: Issue on January / February, 2013.
  • ABDESSAMAD BEN HAMZA, PEDRO L. LUQUE-ESCAMILLA, "Removing Noise and Preserving Details with Relaxed Median Filters", Journal of Mathematical Imaging and Vision 11, 161–177 (1999) °c 1999 Kluwer Academic Publishers. Manufactured in the Netherland.
  • V. Lokeshwara Reddy,Dr. A shubramanyam, Dr. P Chenna Reddy"A New LSB Matching Steganography Method Based on Steganography Information Table, Int. J. Advanced Networking and Applications, Vol: 02, Issue: 05, Pages: 868-872 (2011).