Data Security Using Steganography Through Media Files

Burri Yaswanth Sai, Kolli Greeshma, Gorijavolu Sai Keerthi, Meer Kamal Arif, B. Dasaradha Ram

Abstract


Although cryptography and steganography can provide data security, each of them has a problem. The problem with cryptography is that the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. In steganography, once the presence of hidden information is revealed or even suspected, the message becomes known. According to this paper, a merged technique for data security is proposed using both cryptography and steganography techniques to improve data security. Therefore, two levels ofsecurity will be provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high-quality images and videos.

Cryptography means encrypting the message using a symmetrickey and decrypting the message using the samekey. Steganography is the art of hiding the fact that communication takes place by hiding the information in other media files. So, encrypting themessage and hiding that encrypted message in the media file is called double security providing. This project hides the message in the media file.

References


Journal of Computer Science and Network Security (IJCSNS), vol. 14, no. 6, p. 58, 2014.

M. H. Rajyaguru, “Cryptography-combination of cryptography and steganography with rapidly changing keys,” International Journal of Emerging Technology and Advanced Engineering, ISSN, pp. 2250–2459, 2012.

P. Kumar and V. K. Sharma, “Information security based on steganography & cryptography techniques: A review,” International Journal, vol. 4, no. 10, 2014.

M. K. I. Rahmani and M. A. K. G. M. Mudgal, “Study of cryptography and steganography system,” 2015.

N. Khan and K. S. Gorde, “Data security by video steganography and cryptography techniques,” 2015.

https://iopscience.iop.org/article/10.1088/1757-899X/518/5/052003/pdf

https://arxiv.org/ftp/arxiv/papers/1009/1009.2826.pdf

Provos, N. & Honeyman, P. (2003). Hide and seek: An Introduction to Steganography, IEEE Security and Privacy Magazine.

https://www.geeksforgeeks.org/data-encryption-standard-des-set-1/


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.