Abstract

Information security is a huge trending topic in recent year. Many technique and algorithm were designed and developed toachieve the security of information and/or network across the world. Cryptography is one of the most common tools to provide suchsecurity. Nevertheless, steganography also provide a good security by hiding data within a media in a way that an attacker can't sensethe presence of the secret data. Compression don't normally imply any security , however , it messes up the original encoding of the dataand reduces its size by a measureable amount which makes it perfect for hiding .In this paper a system was proposed where a secretimage is compressed before encryption and hiding. JPEG algorithm was used for the compressing, while at the encryption stage RC4algorithm was used due to its fast processing speed. LSB (Least Significant Bit) technique then applied to hide the secret data within thecover image.

Highlights

  • Information and networks security are becoming highly important in recent years

  • A technique of encryption and hiding was proposed by Hemlata, Mithlesh and Dinesh

  • The last step is embedding the encrypted text to the image using Least Significant Bit (LSB) technique

Read more

Summary

1- INTRODUCTION

Information and networks security are becoming highly important in recent years. The rise of demand for the security solutions comes from the rapid development of technology. A technique is introduced that combines compression, encryption and hiding to secure images. The cipher text is a coded form of the original data; it is not hidden or secret. Many encryption standards exist to achieve security, authentication and integrity[3] Examples of these standards are DES, AES, RC4, SHA1 and RSA and many others with different goals and methods. Steganography is basically a method of hiding some info inside a file. Images provide the easiest and fastest way to hide and transfer the information over the internet.

5- RELATED WORK
9- CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.