CFP last date
22 April 2024
Reseach Article

Steganography using Cryptography and Pseudo Random Numbers

by Unik Lokhande, A. K. Gulve
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 19
Year of Publication: 2014
Authors: Unik Lokhande, A. K. Gulve
10.5120/16905-6977

Unik Lokhande, A. K. Gulve . Steganography using Cryptography and Pseudo Random Numbers. International Journal of Computer Applications. 96, 19 ( June 2014), 40-45. DOI=10.5120/16905-6977

@article{ 10.5120/16905-6977,
author = { Unik Lokhande, A. K. Gulve },
title = { Steganography using Cryptography and Pseudo Random Numbers },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 19 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number19/16905-6977/ },
doi = { 10.5120/16905-6977 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:13.396109+05:30
%A Unik Lokhande
%A A. K. Gulve
%T Steganography using Cryptography and Pseudo Random Numbers
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 19
%P 40-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

When it comes to information hiding it is always a question whether to use Steganography or cryptography. Cryptography scrambles the message so that is it unrecognizable and without proper key the Encrypted message is useless. With the help of steganography messages can be passed over the network discreetly as it provides secure data hiding. It is very challenging and emerging field of research. Steganography can be simple as LSB technique or can be complicated as transform domain techniques, each technique have their own advantage. Both of these techniques are often confused with each other because in a way both are used to hide data. This paper discusses the important aspects of Steganography and Cryptography. How a simple LSB steganography technique in images can be complicated further using combination of Cryptography and Pseudo-random number generator.

References
  1. Unik Lokhande. "An Effective Way of using LSB Steganography in images along with Cryptography. " International Journal of Computer Applications 88(12):25-29, February 2014. Published by Foundation of Computer Science, New York, USA.
  2. Shashikala Channalli, Ajay Jadhav, "Steganography an Art of Hiding Data" International Journal on Computer Science and Engineering Vol. 1 (3), 2009, 137-141.
  3. J. Cummins, P. Diskin, S. Lau and R. Parlett, "Steganography and Digital Watermarking", School of Computer Science, the University of Birmingham, 2004.
  4. N. F. Johnson and S. Jajodia, "Steganalysis: The Investigation of Hidden Information", IEEE Information Technology Conference, September 1998.
  5. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forens. Security 5 (2) (2010)201-214.
  6. Ge Huayong, Huang Mingsheng, Wang Qian, "Steganography and Steganalysis Based on Digital Image", IEEE Trans. International Congress on Image and Signal Processing, (2011) 252-255.
  7. Parag Kadam, Mangesh Nawale, Akash andhare, Mukesh Patil "Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique" Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering February 21-22 2013 IEEE.
  8. Donald E. Knuth "The art of computer programming Vol. 2 ( 3rd Edition): Seminumerical Algorithms"
  9. V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats" Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011).
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Pseudo-Random Numbers.