ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Adaptive Security Scheme for Secret Data using Cryptography and Steganography

Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.2, No. 3)

Publication Date:

Authors : ; ;

Page : 35-40

Keywords : Steganography techniques; Cryptography techniques; Information Hiding; Information Security; Image Hiding; AES;

Source : Download Find it from : Google Scholarexternal

Abstract

In today’s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. The threat of an intruder and Steganalysis accessing secret information for sharing information over an unsecure or covert communication channels are vulnerable to intruder attacks. Although, these techniques are often combined together to achieve higher levels of security but still there is a need of a highly secure system to transfer information over any communication media that minimizes the threat of intrusion. Therefore, to maintain secrecy either we need to make more robust steganography techniques against steganalysis or discover new and better techniques. ?This paper presents a new generalized model by combining cryptographic and steganographic Technique. These two techniques encrypt the data as well as hide the encrypted data in another medium so the fact that a message being sent is concealed. In cryptography we are using Advanced Encryption Standard (AES) algorithm to encrypt secret message and then alteration component method is used to hide encrypted message. By using these two techniques the security of secret data increases to two tier and a high quality of stego image is obtained. ?

Last modified: 2016-07-02 18:08:55