CFP last date
20 May 2024
Reseach Article

An Effective Way of using LSB Steganography in images along with Cryptography

by Unik Lokhande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 12
Year of Publication: 2014
Authors: Unik Lokhande
10.5120/15406-3902

Unik Lokhande . An Effective Way of using LSB Steganography in images along with Cryptography. International Journal of Computer Applications. 88, 12 ( February 2014), 25-29. DOI=10.5120/15406-3902

@article{ 10.5120/15406-3902,
author = { Unik Lokhande },
title = { An Effective Way of using LSB Steganography in images along with Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 12 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number12/15406-3902/ },
doi = { 10.5120/15406-3902 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:27.228890+05:30
%A Unik Lokhande
%T An Effective Way of using LSB Steganography in images along with Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 12
%P 25-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Hiding data is a very important thing nowadays as the data travels over various unsecure networks. To avoid this problem cryptography is used which hides the data or scrambles your message, but cryptography alone cannot provide total security as the message is still available to perform cryptanalysis. Steganography hides the existence of the message. Most of the peoples use either cryptography or steganography to improve security. But a combination of both the techniques provides better security. This paper will describe an effective way of using cryptography along with a modification in LSB steganography in images.

References
  1. Rajani Devi. T "Importance of Cryptography in Network Security" International Conference on Communication Systems and Network Technologies IEEE 2013(462 - 467).
  2. N. F. Johnson and S. Jajodia, "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference, September 1998.
  3. J. Cummins, P. Diskin, S. Lau and R. Parlett, "Steganography and Digital Watermarking", School of Computer Science, the University of Birmingham, 2004.
  4. J. Watkins, "Steganography – Messages Hidden in Bits", 2008.
  5. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forens. Security 5 (2) (2010)201-214.
  6. Ge Huayong, Huang Mingsheng, Wang Qian, "Steganography and Steganalysis Based on Digital Image", IEEE Trans. International Congress on Image and Signal Processing, (2011) 252-255.
  7. Nur Hadisukmana, Yosua Kristianto "Steganography Software with Combination of Encryption Algorithms for Multimedia Files" First International Conference on Informatics and Computational Intelligence IEEE Dec- 2011(100 - 105).
  8. Manoj Kumar Ramaiya ,Naveen Hemrajani, Anil Kishore Saxena "Security Improvisation in Image Steganography using DES" 2012 IEEE(1094 - 1099).
  9. Parag Kadam, Mangesh Nawale, Akash andhare, Mukesh Patil "Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique" Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering February 21-22 2013 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

LSB steganography cryptography AES