Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Image Steganography with Cryptography using Multiple Key Patterns

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 15
Year of Publication: 2014
Aruna Varanasi
M. Lakshmi Anjana
Pravallika Pasupulate

Aruna Varanasi, M.lakshmi Anjana and Pravallika Pasupulate. Article: Image Steganography with Cryptography using Multiple Key Patterns. International Journal of Computer Applications 90(15):12-18, March 2014. Full text available. BibTeX

	author = {Aruna Varanasi and M.lakshmi Anjana and Pravallika Pasupulate},
	title = {Article: Image Steganography with Cryptography using Multiple Key Patterns},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {15},
	pages = {12-18},
	month = {March},
	note = {Full text available}


Image Steganography is the art of hiding information into an innocent image. In this paper a new Steganography method is presented. First, the message is converted into ciphertext using a strong encryption algorithm with the help of secret key. In this proposed Steganography system, sender and receiver share multiple stego keys. Among the multiple stego keys, any one of the stego key is used for steganography. The information about the stego key (key number) is embedded in the first pixels of the original image. Based on the pattern given in the stego key, ciphertext is embedded in the pixels of original image. The receiver first extracts the key number and then obtains the stego key from the database. Using the pattern given in the stego key, ciphertext is retrieved from the pixels of Stego image. The ciphertext is decrypted using the secret key. Thus, it is difficult to recognize that some information is embedded in the cover image, called Stego image, which is same as original image. The proposed system is simple and robust against the attacks.


  • Abdelmgeid Amin Ali and Al – Hussien Seddik Saad "Image Steganography Technique By Using Braille method of Blind People (LSBraille)".
  • Akanksha Kaushal, Prof Vineeta Chaudhary "A Secure Data Hiding Technique: Steganography", International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 2, Issue 10, October 2013.
  • A. Nag , S. Biswas , D. Sarkar , P. P. Sarkar "A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010.
  • Chamkor Singh and Gaurav Deep "Cluster Based Image Steganography Using Pattern Matching", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS).
  • Neil F. Johnson,Sushil Jojodia – "Exploring Steganography : Seeing the Unseen" IEEE computer, February 1998 pp26-34.
  • R. Chandramouli, Nasir Memon, "Analysis of LSB Based Image Steganography Techniques" Proc. IEEE ICIP pp1019-1022, 2001.