Secure Image Hiding Algorithm using Cryptography and Steganography

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5

Abstract

 In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography  and steganography are the two major techniques for secret communication.In this paper,the secret image is first  encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique  compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of  steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key  factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non – Repudiation

Authors and Affiliations

Hemlata Sharma

Keywords

Related Articles

 A Review on Geometrical Analysis in Character Recognition

 Abstract: Character Recognition is a prominent area in the field of image processing. Most of the basicconcepts in image processing have been introduced in connection with research carried out in characterrecogniti...

 Privacy Preserving and Load Balancing For Secure Cloud Storage

 Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...

 Image Enhancement Techniques: A Selected Review

 Image enhancement is one of the key issues in high quality pictures such as digital cameras. Since image clarity is very easily affected by lighting, weather, or equipment that has been used to capture the image....

A Survey on Different Levels of Risks during Different Phases in Data Warehouse

Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses...

 Identify the surgically altered face images using granular-PCA approach

 Abstract: Plastic surgery provide a way to enhance the facial appearance. The non-linear variations introduced by the plastic surgery has raised a challenge for face recognition algorithms. In this research we ma...

Download PDF file
  • EP ID EP131056
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Hemlata Sharma (2013).  Secure Image Hiding Algorithm using Cryptography and Steganography. IOSR Journals (IOSR Journal of Computer Engineering), 13(5), 1-6. https://europub.co.uk./articles/-A-131056