ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Information Hiding Using Image Based Steganography and Cryptography

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 1584-1590

Keywords : steganography; cryptography; RSA encryption; canny edge detector; LSB;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays, the Internet is an indepensable communication channel of today's life. In wide systems, information should be transferred via safe communication channels including data security, copyright safety, human privacy, etc. Some potential problems, however, have resulted from the improving Internet, such as the copy and corruption of digital information. Therefore, the information security is considered as one immediate topic. Technologies for information and communication security have brought forth powerful tools to make this vision come true, despite many different kinds of adverse circumstances. Cryptography and steganography are the most widely used techniques to defeat this threat. Cryptography involves converting a message text into a scribbled cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both the techniques provide some security of data, neither of them is individually secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks. Many techniques came into existence to hide message securely in different types of cover media like video, audio and also images.

Last modified: 2021-06-30 21:15:01