Abstract

Steganography is a profession of masking the secret information using some other harmless message. One needs to be very careful while sharing any information on public network as there are more chances of an intrusion. Therefore the art of covering information is highly in demand known as Steganography. To satisfy the need of safe transmission, many known techniques like modern data compression, information theory, spread spectrum, and cryptography technologies were integrated to bring up Steganography. This paper proposed an approach of building a secure data hiding technique using Cryptography and Steganography which assures high secrecy of data over network.

Highlights

  • Nowadays, the communication becomes the basic necessity in every growing field

  • In order to transmit data safely with implemented secrecy we may go through two ways- cryptography and Steganography

  • This is a new algorithm which enforces the new technique of Steganography using LSB, N-queen and private key together boosting up the security of existing system to very high level

Read more

Summary

INTRODUCTION

The communication becomes the basic necessity in every growing field. The data can be shared using different pathways like internet or telephone. Cryptography is a way to encrypt a message in some coding language at the sender side and the receiver decode that data. The public and private keys are used to code or decode the data at sender and the receiver ends are called encryption and decryption keys This message cannot be read by anyone except the receiver. Steganography is an art of hiding data or communication in such a way that there will be no chance of an attack It hides the important information inside other multimedia content like image, audio, video and this is termed as Embedding. There are different ways of using steganography depending upon the type of multimedia used This should be taken care that the embedded secret message should not change the quality of stego image

RELATED STUDY
PROBLEM DEFINITION
PROPOSED SOLUTION
PERFORMANCE METRICES
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.