High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Secure Information Hiding Technique using Text Steganography Followed by Image Steganography

Author(s):

Suthar Maulik Kumar , Rajasthan Institute of Engineering & Technology, Jaipur; Mukesh Kumar Choudhary, Rajasthan Institute of Engineering & Technology, Jaipur

Keywords:

Steganalysis, Image, Security, Cryptography

Abstract

Steganography is a data encoding technique which prime aim to hide the information into a carrier or enveloped media. The word steganography came from Greek language, which means covert writing. Today each information is going in digital due to the fast communication of data through internet. Hence, today digital word demands secret communication. So, here is a need of sending information through cover media. There are many kinds of cover media are available among them images are preferred mainly. The secret and confidential data requires such data hiding technique to avoid the attack. The secure communication of data continuously demands to develop the secure steganography technique. Information system security is an authority or disciplines that aim is to provide Availability, Confidentiality, and Integrity. Today's digital media is the way for fast communication. Each and every thing is presented in digital form over cloud or internet. In this way, there is a requirement for secure correspondence. Locale increasing obvious cryptography is utilized to cover numerous mystery levels in an unmarried picture. In n level spot increasing obvious cryptography conspire; photograph is partitioned in n regions. Every area incorporates one level certainty. For forcing unmistakable cryptography in n levels need to encode (n+1) stocks in such a way in this way, that any single offer isn't in a situation to uncover the records and by utilizing joining any two offers, first degree insights may be seen. After visible cryptography the photograph is embedded into the duvet photo and gets the steno photo. So, it is difficult to discover by using the steganalysis and it is appear like as a cowl photograph. In proposed set of rules, problem of pixel growth and negative evaluation has been re-moved and further it's far changed to generate the ranges automatically which is known as automatic vicinity incrementing visible cryptography.

Other Details

Paper ID: IJSRDV7I80385
Published in: Volume : 7, Issue : 8
Publication Date: 01/11/2019
Page(s): 499-506

Article Preview

Download Article