Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Steganography using Cryptography and Pseudo Random Numbers

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 19
Year of Publication: 2014
Authors:
Unik Lokhande
A. K. Gulve
10.5120/16905-6977

Unik Lokhande and A K Gulve. Article: Steganography using Cryptography and Pseudo Random Numbers. International Journal of Computer Applications 96(19):40-45, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Unik Lokhande and A. K. Gulve},
	title = {Article: Steganography using Cryptography and Pseudo Random Numbers},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {19},
	pages = {40-45},
	month = {June},
	note = {Full text available}
}

Abstract

When it comes to information hiding it is always a question whether to use Steganography or cryptography. Cryptography scrambles the message so that is it unrecognizable and without proper key the Encrypted message is useless. With the help of steganography messages can be passed over the network discreetly as it provides secure data hiding. It is very challenging and emerging field of research. Steganography can be simple as LSB technique or can be complicated as transform domain techniques, each technique have their own advantage. Both of these techniques are often confused with each other because in a way both are used to hide data. This paper discusses the important aspects of Steganography and Cryptography. How a simple LSB steganography technique in images can be complicated further using combination of Cryptography and Pseudo-random number generator.

References

  • Unik Lokhande. "An Effective Way of using LSB Steganography in images along with Cryptography. " International Journal of Computer Applications 88(12):25-29, February 2014. Published by Foundation of Computer Science, New York, USA.
  • Shashikala Channalli, Ajay Jadhav, "Steganography an Art of Hiding Data" International Journal on Computer Science and Engineering Vol. 1 (3), 2009, 137-141.
  • J. Cummins, P. Diskin, S. Lau and R. Parlett, "Steganography and Digital Watermarking", School of Computer Science, the University of Birmingham, 2004.
  • N. F. Johnson and S. Jajodia, "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference, September 1998.
  • W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forens. Security 5 (2) (2010)201-214.
  • Ge Huayong, Huang Mingsheng, Wang Qian, "Steganography and Steganalysis Based on Digital Image", IEEE Trans. International Congress on Image and Signal Processing, (2011) 252-255.
  • Parag Kadam, Mangesh Nawale, Akash andhare, Mukesh Patil "Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique" Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering February 21-22 2013 IEEE.
  • Donald E. Knuth "The art of computer programming Vol. 2 ( 3rd Edition): Seminumerical Algorithms"
  • V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats" Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011).