Abstract:Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key factor on the network performance measures. So, the confidentiality and the integrity of data are needed to prevent eavesdroppers from accessing and using transmitted data. Steganography and Cryptography are two important techniques that are used to provide network secur… Show more
“…In paper [7], cryptography incorporated steganography is imply (CICS) to supply a highly secure steganography algorithm for the files of the multiple formats, The performance analysis of the tactic and therefore the measurement of the parameters like the PSNR and therefore the SSIM are done to confirm the efficiency of the proffered method. A digital signature is constructed upon the concept of public key encryption.…”
Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part of computing and communication. In this report, we’ve got explored techniques that blend cryptography and steganography together. Steganography may be a specialty of science to manage and conceal a chunk of important information inside image, audio, video, or text documents. Steganography may be a method and study of composing a secret communication specified only the source and also the targeted beneficiary will realize the concealed information. the information concealed or covered process starts with the steganography method by identifying a network canopy and redundant parts, i.e. only permitted persons would be able to change without affecting the standard of that medium. The encoding method generates a Stego medium by substituting these redundant bits with the concealed message content. In this report, various approaches for information hiding using both cryptography and steganography is proposed keeping in mind two considerations-size of the encrypted object and degree of security. Here, signature image, text, audio information is kept hidden into a cover image using the private key of sender and receiver, which extracts the data from stego image employing a public key. This approach is often used for message authentication, message integrity, and non-repudiation purpose.
“…In paper [7], cryptography incorporated steganography is imply (CICS) to supply a highly secure steganography algorithm for the files of the multiple formats, The performance analysis of the tactic and therefore the measurement of the parameters like the PSNR and therefore the SSIM are done to confirm the efficiency of the proffered method. A digital signature is constructed upon the concept of public key encryption.…”
Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part of computing and communication. In this report, we’ve got explored techniques that blend cryptography and steganography together. Steganography may be a specialty of science to manage and conceal a chunk of important information inside image, audio, video, or text documents. Steganography may be a method and study of composing a secret communication specified only the source and also the targeted beneficiary will realize the concealed information. the information concealed or covered process starts with the steganography method by identifying a network canopy and redundant parts, i.e. only permitted persons would be able to change without affecting the standard of that medium. The encoding method generates a Stego medium by substituting these redundant bits with the concealed message content. In this report, various approaches for information hiding using both cryptography and steganography is proposed keeping in mind two considerations-size of the encrypted object and degree of security. Here, signature image, text, audio information is kept hidden into a cover image using the private key of sender and receiver, which extracts the data from stego image employing a public key. This approach is often used for message authentication, message integrity, and non-repudiation purpose.
“…Advances in technology have allowed steganography (meaning hidden writing) to occupy a certain position in the field of information encoding and its concealment. Such a trend has emerged in the field of information security as computer steganography (the secret message is hidden in other than original media such as Text, Image, video and audio form) [1][2][3][4]. The general idea of hiding some information in digital content has a wider class of applications that go beyond Steganography.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike information hiding and digital watermarking, the main goal of steganography is to communicate securely in a completely undetectable manner. A steganography task is to hide a certain message in another container file, so that the presence of the hidden message cannot be seen [2,3]. As containers, digital images, audio and video files are commonly used [2,5,7].…”
Section: Related Workmentioning
confidence: 99%
“…An overview of the existing methods of solving the problem [2,3,5], showed that the most promising in terms of information capacity are containers in the form of image files in BMP format. Methods that use image files are the most advantageous and promising, since they practically do not limit the amount of data transferred, it all depends on the container selected.…”
Section: The Basic Steganography Techniquementioning
confidence: 99%
“…In the general case, it is advisable to use the word "message" because the message can be plaintext, cipher text, image, spreadsheet, audio or even video data [2]. Basically, any form of data that can be represented in a bitstream can be hidden through steganography [3,4].…”
The purpose of this work is to increase the level of concealment of information from unauthorized access by preencrypting and hiding it in multimedia files such as images. A crypto-steganographic information protection algorithm with LSB-method was implemented. The algorithm hides AES preencrypted confidential information in the form of text or images into target containing image files. This method uses the concept of data concealing in the least significant pixel bits of the target image files. The proposed method relies on the use of Diffie-Hellman public key exchange protocol for securely exchanging the stego-key used for LSB as well as the public key used for encrypting the secret information. The algorithm ensures that the visual quality of the image remains unchanged, with no distortions perceived by the human eye. The algorithm also complicates the detection of concealed information embedded in the target image with use of PRNG as an enhancement for LSB. The proposed system scheme achieved competitive results. On an average, the system achieved a Peak Signal-to-Noise Ratio (PSNR) of 96.3 dB and a Mean Square Error (MSE) of 0.00408. The results obtained demonstrate that the proposed system offers high payload capabilities with immunity against visual degradation of resultant stego images.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.