Data Security Using Steganography Through Media Files
Abstract
Although cryptography and steganography can provide data security, each of them has a problem. The problem with cryptography is that the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. In steganography, once the presence of hidden information is revealed or even suspected, the message becomes known. According to this paper, a merged technique for data security is proposed using both cryptography and steganography techniques to improve data security. Therefore, two levels ofsecurity will be provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high-quality images and videos.
Cryptography means encrypting the message using a symmetrickey and decrypting the message using the samekey. Steganography is the art of hiding the fact that communication takes place by hiding the information in other media files. So, encrypting themessage and hiding that encrypted message in the media file is called double security providing. This project hides the message in the media file.References
Journal of Computer Science and Network Security (IJCSNS), vol. 14, no. 6, p. 58, 2014.
M. H. Rajyaguru, “Cryptography-combination of cryptography and steganography with rapidly changing keys,†International Journal of Emerging Technology and Advanced Engineering, ISSN, pp. 2250–2459, 2012.
P. Kumar and V. K. Sharma, “Information security based on steganography & cryptography techniques: A review,†International Journal, vol. 4, no. 10, 2014.
M. K. I. Rahmani and M. A. K. G. M. Mudgal, “Study of cryptography and steganography system,†2015.
N. Khan and K. S. Gorde, “Data security by video steganography and cryptography techniques,†2015.
https://iopscience.iop.org/article/10.1088/1757-899X/518/5/052003/pdf
https://arxiv.org/ftp/arxiv/papers/1009/1009.2826.pdf
Provos, N. & Honeyman, P. (2003). Hide and seek: An Introduction to Steganography, IEEE Security and Privacy Magazine.
https://www.geeksforgeeks.org/data-encryption-standard-des-set-1/
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â