Downloads: 121 | Views: 300
Research Paper | Information Technology | Iraq | Volume 4 Issue 6, June 2015 | Popularity: 6.7 / 10
Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator
Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas
Abstract: Secure transmissions of information become a critical issue in the digital world with the growing importance of the internet. Cryptography and steganography helps in providing this much-needed data confidentiality. This research presented an improved steganographic method for hiding secure data. The proposed system is incorporating of text encryption, steganography and data compression based on an efficient keystream generator. In the first step, the secret data has been encrypted using stream cipher. This cipher text is embedded into BMP image format cover using pseudorandom keystream generator as a private key. Then the image file transmitted is compressed by using discrete cosine transform to obtain the JPEG image format. The experimental results show that the proposed method is provide improved robustness, security due to multi-level security and the use of the efficient keystream generator increases the complexity of the encryption process.
Keywords: Cryptography, Image Steganography, Data Compression, Keystream Generator
Edition: Volume 4 Issue 6, June 2015
Pages: 627 - 631
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 9 Issue 9, September 2020
Pages: 1656 - 1664Latency Optimization for Cross-Region Data Replication in EKS
Babulal Shaik
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 959 - 963Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 12 Issue 5, May 2023
Pages: 2681 - 2682Blockchain in Cloud Computing
Goutham Sabbani
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023
Pages: 1117 - 1121Cryptocurrency Financial Risk Analysis using Machine Learning
Tanya Kapoor, Laxmi Ahuja
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 1415 - 1423Quantum Computing and Cloud: Future Prospects - Exploration of Quantum Computing Capabilities in the Cloud
Sandeep Chinamanagonda