Book Details

Secure Data Transfer Over Internet using Image Steganography

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

Steganography is the technique of hiding private or sensitive information within something that appears to be nothing is a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception; human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a key or a pass word to lock the text, what this key does is it encrypts the text, so that even if it is hacked by hacker, he will not be able to read the text. You will need the key to decrypt the hidden text. User then sends the image and key to the receiver and receiver first opens the image, and then he enters the key or password for decryption of text, he then presses decrypt key to get secret text of the sender. By using this method, you can double ensure that your secret message is sent secretly without outside interference of hackers or crackers. If sender sends this image in public others will not know, what is it, and it will be received by receiver.

References

[1] Rajendran S, Doraipandian M. "Chaotic map based random image steganography using lsb technique," IJ Network Security. 2017;19:593-598.

[2] Ismael HR, Ameen SY, Kak SF, Yasin HM, Ibrahim IM, Ahmed AM, et al. "Reliable Communications for Vehicular Networks," Asian Journal of Research in Computer Science. 2021;33-49.

[3] A. Khaldi, "Steganographic Techniques Classification According to Image Format," International Annals of Science. 2020;8: 143-149.

[4] Abdullah RM, Ameen SY, Ahmed DM, Kak SF, Yasin HM, Ibrahim IM. et al. "Paralinguistic Speech Processing: An Overview," Asian Journal of Research in Computer Science. 2021;34-46.

[5] Haref QM, Taha MS, M. Rahim MS, Hashim MM, Ahmad AMB. Rifa'i, Categorization of spatial domain techniques in image steganography: A revisit," Journal of Advanced Research in Dynamical and Control Systems. 2021;10: 1538-1551.

Keywords

Steganography, Private, Public key, Secret Text, Hackers.

Image
  • Format Volume 10, Issue 1, No 7, 2022.
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Pavithra N, Mr.N. Ganapathiram
  • Reference IJCS-418
  • Page No 2820-2822

Copyright 2024 SK Research Group of Companies. All Rights Reserved.