CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Image Steganography with Cryptography using Multiple Key Patterns

by Aruna Varanasi, M.lakshmi Anjana, Pravallika Pasupulate
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 15
Year of Publication: 2014
Authors: Aruna Varanasi, M.lakshmi Anjana, Pravallika Pasupulate
10.5120/15795-4481

Aruna Varanasi, M.lakshmi Anjana, Pravallika Pasupulate . Image Steganography with Cryptography using Multiple Key Patterns. International Journal of Computer Applications. 90, 15 ( March 2014), 12-18. DOI=10.5120/15795-4481

@article{ 10.5120/15795-4481,
author = { Aruna Varanasi, M.lakshmi Anjana, Pravallika Pasupulate },
title = { Image Steganography with Cryptography using Multiple Key Patterns },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 15 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number15/15795-4481/ },
doi = { 10.5120/15795-4481 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:06.534706+05:30
%A Aruna Varanasi
%A M.lakshmi Anjana
%A Pravallika Pasupulate
%T Image Steganography with Cryptography using Multiple Key Patterns
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 15
%P 12-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Steganography is the art of hiding information into an innocent image. In this paper a new Steganography method is presented. First, the message is converted into ciphertext using a strong encryption algorithm with the help of secret key. In this proposed Steganography system, sender and receiver share multiple stego keys. Among the multiple stego keys, any one of the stego key is used for steganography. The information about the stego key (key number) is embedded in the first pixels of the original image. Based on the pattern given in the stego key, ciphertext is embedded in the pixels of original image. The receiver first extracts the key number and then obtains the stego key from the database. Using the pattern given in the stego key, ciphertext is retrieved from the pixels of Stego image. The ciphertext is decrypted using the secret key. Thus, it is difficult to recognize that some information is embedded in the cover image, called Stego image, which is same as original image. The proposed system is simple and robust against the attacks.

References
  1. Abdelmgeid Amin Ali and Al – Hussien Seddik Saad "Image Steganography Technique By Using Braille method of Blind People (LSBraille)".
  2. Akanksha Kaushal, Prof Vineeta Chaudhary "A Secure Data Hiding Technique: Steganography", International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 2, Issue 10, October 2013.
  3. A. Nag , S. Biswas , D. Sarkar , P. P. Sarkar "A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010.
  4. Chamkor Singh and Gaurav Deep "Cluster Based Image Steganography Using Pattern Matching", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS).
  5. Neil F. Johnson,Sushil Jojodia – "Exploring Steganography : Seeing the Unseen" IEEE computer, February 1998 pp26-34.
  6. R. Chandramouli, Nasir Memon, "Analysis of LSB Based Image Steganography Techniques" Proc. IEEE ICIP pp1019-1022, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Encryption Decryption Plaintext Ciphertext Stego image Cover image Secret key Stego key.