Secure Data Transfer Through Internet Using Image Steganography

Authors

  • Nikita Sudhakar Jamgade  Jhulelal Institute of Technology, Department of Computer Science and Engineering MTECH KH No. 68 and 72 Village Lonara off, Nagpur, Maharashtra, India
  • Kishor Peshwani  Jhulelal Institute of Technology, Department of Computer Science and Engineering MTECH KH No. 68 and 72 Village Lonara off, Nagpur, Maharashtra, India

DOI:

https://doi.org//10.32628/IJSRSET229151

Keywords:

Cryptography, Steganography, RSA, RMI Architecture, Distributed connection, JPEG image

Abstract

Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So,for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing both Cryptography and Steganography. This algorithm imposed a cipher text within a cover image to conceal the existence of the cipher text and the stego-image is transferred from sender to intended receiver by invoking a distributed connection among them to achieve the data authenticity.

References

  1. Behrouz A. Forouzan, “Cryptography and Network Security”, McGraw Hil , 2007.
  2. Herbert Schidlt, “Java the Complete Reference”, 8th Edition, McGraw Hill, 2011.
  3. N.F. Johnson and S. Jajodia, “Explor ing Steganography: Seeing the Unseen”, Computer, Vol. 31, No. 2, pp.26-34, 1998.
  4. S. Song, J. Zhang, X. Liao, J. Du and Q.Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Procedia Engineering, Vol. 15, pp. 2767-2772, 2011.
  5. A.J. Raphael and V. Sundaram, “Cryptography and Steganography-A Survey”, Internatio nal Journal of Computer Technology and Applicatio ns, Vol. 2, No. 3, pp. 626-630, 2016.
  6. S.A. Laskar and K. Hemachandran, “An Analysis of Steganography and Steganalysis Techniques”,Assam University Journal of Science and Technology, Vol. 9, No. 2, pp. 83-103, 2012.
  7. F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn,“Information Hiding-A Survey”, Proceedings Of International Conference on Protection of Multimedia, pp. 1062-1078, 1999.
  8. Y.S. Huang, Y.P. Huang, K.N. Huang and M.S. Young, “The Assessment System of Human Visual Spectral Sensitivity Curve by Frequency Modulated Light”, Proceedings of IEEE International Conference On Engineering in Medicine and Biology, pp. 263-265, 2005.
  9. T. Morkel, J.H.P. Eloff and M.S. Oliver, “An Overview of Image Steganography”, Proceedings of 5th Annual Conference on Information Security, pp. 111-116, 2005.
  10. T. Handel and M. Sandford, “Hiding Data in the OSI Network Model”, Proceedings of 1st International Workshop on Information Hiding, pp. 1-7, 1996

Downloads

Published

2022-02-28

Issue

Section

Research Articles

How to Cite

[1]
Nikita Sudhakar Jamgade, Kishor Peshwani, " Secure Data Transfer Through Internet Using Image Steganography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 1, pp.185-188, January-February-2022. Available at doi : https://doi.org/10.32628/IJSRSET229151