Downloads: 168 | Views: 330
Research Paper | Computer Science & Engineering | India | Volume 9 Issue 5, May 2020 | Popularity: 6.8 / 10
Image Steganography Based on Improved LSB Embedding and AES Cryptography
Abhishek Singh
Abstract: Steganography is the art of hiding important information in various multimedia files. The sender and the intended receiver is aware of the existence of important message. Image Steganography is a technique of using an image file as a cover object. Cryptography is used to protect the information from the unintended user, by the encryption and decryption techniques, for secure communication. In this paper, LSB Steganography method is the proposed technique which focused on RGB colour image because it is uncompressed and suitable than any other image format. AES cryptography technique has also been used in the proposed method, for enhanced security. In this research, the performance of a combination of LSB-AES algorithms on various cover image sizes is analysed. To measure performance and image quality PSNR and MSE is used. The original image will be compared by the resulting image. Hence the proposed technique of steganography and cryptography is efficient for hiding the information inside the image, with more security.
Keywords: Steganography, Cryptography, Encryption, Decryption, LSB, AES
Edition: Volume 9 Issue 5, May 2020
Pages: 475 - 488
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2003
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera