Data Confidentiality Using Steganography and Cryptographic Techniques

被引:0
|
作者
Prashanti, G. [1 ]
Jyothirmai, B. V. [1 ]
Chandana, K. Sai [1 ]
机构
[1] Vignans Lara Inst Technol & Sci, Informat Technol, Guntur, India
关键词
cryptography; steganography; least significant bit (LSB); grayscale;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
First, the sender encrypts the secret message using cipher algorithm which uses a secret key that should be known to both the sender and receiver. To provide dual security the encrypted message obtained from different encryption methods is hidden in an image based on LSB stegnography. From receive side the encrypted message is extracted from the image and is then decrypted using decrypted methods to get the original secret message. Matlab is used as a simulator to implement the techniques of encryption and steganography. Matlab provide highly computing environment and advanced in built function for image processing.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
    Hambouz, Ahmed
    Shaheen, Yousef
    Manna, Abdelrahman
    Al-Fayoumi, Mustafa
    Tedmori, Sara
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
  • [2] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [3] PSO-based steganography scheme using DWT-SVD and cryptography techniques for cloud data confidentiality and integrity
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    [J]. Journal of Computers (Taiwan), 2019, 30 (06) : 31 - 45
  • [4] Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme
    Dawson, John Kwao
    Twum, Frimpong
    Acquah, James Benjamin Hayfron
    Missah, Yaw Marfo
    [J]. PLOS ONE, 2023, 18 (02):
  • [5] A Cryptographic Approach for Steganography
    Bahi, Jacques M.
    Guyeux, Christophe
    Heam, Pierre-Cyrille
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 518 - 521
  • [6] Cryptographic Techniques for Data Processing
    Sharma, Shantanu
    Mehrotra, Sharad
    [J]. PROCEEDINGS OF THE 5TH JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA, CODS COMAD 2022, 2022, : 344 - 347
  • [7] Efficient Image Steganography Using Adaptive Cryptographic Algorithms
    Hasan, Mahadi
    Tabassum, Mehnaz
    Hossain, Md Jakir
    [J]. INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 558 - 568
  • [8] Data Hiding in Images Using Some Efficient Steganography Techniques
    Maiti, Chandreyee
    Baksi, Debanjana
    Zamider, Ipsita
    Gorai, Pinky
    Kisku, Dakshina Ranjan
    [J]. SIGNAL PROCESSING, IMAGE PROCESSING AND PATTERN RECOGNITION, 2011, 260 : 195 - 203
  • [9] Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity
    Garcia, Jose Luis Cano
    Udechukwu, Izuchukwu Patrick
    Ibrahim, Isiaq Bolaji
    Chukwu, Ikechukwu John
    Dag, Hasan
    Dimitrova, Vesna
    Mollakuqe, Elissa
    [J]. 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 250 - 257
  • [10] Encryption Techniques for Cloud Data Confidentiality
    Soofi, Aized Amin
    Khan, M. Irfan
    Fazal-e-Amin
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (04): : 11 - 20