International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 300

Research Paper | Information Technology | Iraq | Volume 4 Issue 6, June 2015 | Popularity: 6.7 / 10


     

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas


Abstract: Secure transmissions of information become a critical issue in the digital world with the growing importance of the internet. Cryptography and steganography helps in providing this much-needed data confidentiality. This research presented an improved steganographic method for hiding secure data. The proposed system is incorporating of text encryption, steganography and data compression based on an efficient keystream generator. In the first step, the secret data has been encrypted using stream cipher. This cipher text is embedded into BMP image format cover using pseudorandom keystream generator as a private key. Then the image file transmitted is compressed by using discrete cosine transform to obtain the JPEG image format. The experimental results show that the proposed method is provide improved robustness, security due to multi-level security and the use of the efficient keystream generator increases the complexity of the encryption process.


Keywords: Cryptography, Image Steganography, Data Compression, Keystream Generator


Edition: Volume 4 Issue 6, June 2015


Pages: 627 - 631



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas, "Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 627-631, https://www.ijsr.net/getabstract.php?paperid=SUB155237, DOI: https://www.doi.org/10.21275/SUB155237



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 9 Issue 9, September 2020

Pages: 1656 - 1664

Latency Optimization for Cross-Region Data Replication in EKS

Babulal Shaik

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 5, May 2023

Pages: 2681 - 2682

Blockchain in Cloud Computing

Goutham Sabbani

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1117 - 1121

Cryptocurrency Financial Risk Analysis using Machine Learning

Tanya Kapoor, Laxmi Ahuja

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 1415 - 1423

Quantum Computing and Cloud: Future Prospects - Exploration of Quantum Computing Capabilities in the Cloud

Sandeep Chinamanagonda

Share this Article
Top