ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Steganography with Cryptography Technique For Data Hiding

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 1)

Publication Date:

Authors : ; ;

Page : 2312-2318

Keywords : Steganography; Cryptography; Least Significant Bit substitution method; RSA algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. In steganography nothing but the concealed communication which is prefers for secure our data from unauthorized person. In this technique secret information can be replaced or conceal behind the cover information unsuspicious. Cryptography is the technique, where secret information is replaced in unreadable format. The present work is focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encrypted algorithm in cryptography. Secondly the encrypted data must be hidden in an image or video or an audio file with help of steganographic algorithm. Thirdly by using decryption technique the receiver can view the original data from the hidden image or video or audio file. Transmitting data or document can be done through these ways will be secured. In this paper we implemented three encrypt techniques like RSA algorithm along with steganographic algorithm like LSB substitution technique.

Last modified: 2021-06-30 21:20:16