Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
4 pages
1 file
This research introduces "Steganoflage," a novel approach to image steganography that enhances the concealment of data within images. The approach employs an innovative bulk data encryption method using Irreversible Fast Fourier Transform (IrFFT), a real-time skin tone detection algorithm, and incorporates computer vision to improve the embedding process. The findings suggest a significant advancement in secure image transmission, emphasizing improvements in data integrity and resilience against geometric distortions and attacks compared to existing algorithms.
Organizations have desired to keep certain sensitive communications and information secret for years. In our new age of digital media and internet communications, this need often seems even more pressing. Today’s information age, were technology has made information sharing and transfer increased exponentially and also making the information vulnerable to unauthorized access, use, modification and interception both while in storage or in transmission. It is no surprise that countless encryption methods of protecting such information like cryptography, water marking and many more have evolved. One lesser- known but rapidly growing encryption method is Steganography. Though steganography is an ancient craft, the onset of computer technology has given it new life. Computer-based stenographic techniques introduce changes to digital covers such as Image, Audio and Video.
2014
Now a day’s Steganography plays an important role in defence, public sectors works and internet. Cryptography created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt, decrypt data in order to keep message secret .Unfortunately sometimes it may not be enough to keep the contents of a message secret .It may also be necessary to keep the existence of the message secret .The technique used to implement this is called Steganography and it different from cryptography in the sense cryptography focuses on keeping contents of a message secret Steganography focuses on keeping the existence of message secret for more security we proposed new methods that combines with both cryptography and Steganography. There are two types of techniques are implemented, The first technique implemented sequentially starting with the top left pixel and then encodes information from top to bottom and left to right, and another techniques implemen...
2021
Received April 19, 2021 Revised April 27, 2021 Accepted April 27, 2021 In the world of increasing usage of the internet, data security plays an important role in achieving confidentiality, authentication, and integrity for secure communication. Cryptography and Steganography is the method to achieve data security through which information is protected and only the intended person can read the information. In this paper, a technique is proposed where Steganography and Cryptography are used in a combined manner for securing the data. In which the LSB method is used for embedding and extracting the data from the image. A symmetric cryptographic algorithm used to encrypt the data is done by using Armstrong numbers before embedding the data into the image. A key is generated using Armstrong numbers and any specified string and the same key generated is used for encrypting and decrypting the data.
Two New Approaches for Image Steganography Using Cryptography, 2015
The process of jumbling up the contents of a secret message so as to secure it, is known as cryptography, whereas the process of hiding the very existence of a secret message is known as steganography. The term "steganography" describes the method by which the contents of a secret message are concealed inside some other medium, so as to avoid any kind of detection by an intruder. In this paper, we have proposed two new approaches wherein both cryptography and steganography are used to encrypt the data and also to conceal these encrypted contents in some other medium. In the first method proposed, we have secured an image by converting it into an encrypted text using S-DES algorithm and a secret key and then concealing this encrypted text in some other image, whereas in the second method, we have secured an image directly by encrypting it using S-DES algorithm and an image key. The contents thus obtained are concealed inside another image so as to hide its very existence. Both these techniques have been tested and it has been observed that they prevent the possibilities of steganalysis also.
2014
Steganography is the technique of hiding information so that any intermediate third party is unaware about the presence of secret message. Digital steganography uses some digital media as the cover for the secret message, like in our case, we have used digital images as the cover media. Essence of steganography is that the third party should never be able to detect the presence of secret message in the cover image. Once the third party detects the secret message, it is assumed that the steganography technique has failed to serve its purpose. The proposed model presents a novel approach of develop a secure data hiding technique of Steganography using wavelet transform, Some logical operations, binary convertor, along with random number generation method. Keywords— Digital image, information hiding, steganography, PSNR value, LSB.
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego -image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless -there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.
International Journal of Advances in Applied Sciences (IJAAS), 2021
Information is a vital thing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the concealing science in which the information is concealed inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide data inside a cover media for example text, image, and audio steganography, but image steganography is the most utilized technique among the others. Secure image steganography has a highsecurity level than traditional technique by combining steganography with cryptography due to encrypting secret information by cryptography algorithm before embedding it into the cover media by steganography algorithm. In this paper, a systematic review has been presented about secure image steganography and its renowned types. Many researchers proposed secure image steganography by using various cryptography and steganography algorithms which have been reviewed. The least significant bit 'LSB' was the renowned steganography algorithm which has been used by researchers due to its simplicity, while various cryptography algorithms like advanced encryption standard (AES) and blowfish have been used to propose secure image steganography in the reviewed papers. The comparison among the reviewed papers indicated that the LSB with hash-RSA gave a greater peak signal-noise ratio 'PSNR' value than the others which was 74.0189 dB.
2007
In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. We will show such system is an effective steganographic one (making a comparison with the well known F5 algorithm) and is also a theoretically unbreakable cryptographic one (demonstrating its equivalence to the Vernam Cipher).
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non -Repudiation.
International journal of engineering research and technology, 2019
Steganography is the advanced methodology for concealing secret data than the other strategies used to date. There are often cases when it is not possible to send messages openly or in encrypted form. This is where steganography play its role. While cryptography provides privacy which is intended to provide secrecy. Steganography aims to hide the secret messages and also for communication and transferring of data. So nobody aside from the licensed sender and receiver are tuned in to the existence of the key information. This paper intends to give an overview of image steganography and its uses and hiding the files (text file, audio file, video file, image file, etc.,) by using LSB and AES algorithm where AES is used for password protecting system so that if anyone can find the Stego-image they will not read the message because data is still in the encrypted form and LSB is used for hiding the data.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International journal of engineering research and technology, 2017
International Journal of Advanced Research in Computer Science and Software Engineering, 2018
Research in Medical & Engineering Sciences, 2018
International Journal of Engineering Trends and Technology
Journal of emerging technologies and innovative research, 2018
International Journal of Advanced Research in Computer Science, 2017
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
International Journal of Advanced Computer Science and Applications, 2016
International Journal of Information Technology, Modeling and Computing, 2014