Science Alert
Curve Top
Information Technology Journal
  Year: 2011 | Volume: 10 | Issue: 10 | Page No.: 1896-1907
DOI: 10.3923/itj.2011.1896.1907
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Stego on 2n:1 Platform for Users and Embedding

M. Padmaa, Y. Venkataramani and Rengarajan Amirtharajan

The study of communication security includes not just encryption but also traffic security, whose essence lies in "Information Hiding". The security of an image can be enhanced by cleverly embedding data without affecting its quality. This can be done by using information hiding techniques like steganography and cryptography. Combining steganography with cryptography becomes an essential facet for secure communication. In present study, enhanced image quality and security is obtained by consorting pixel indicator technique with PVD technique. Here, the raw data is first encrypted to get two different forms of message T1 and T2 using two distinct keys K1, K2 which is done by using encryption algorithms. As two encrypted messages can be embedded in this process, we have to first extract and then decrypt the message to retrieve the original data. The enhanced level of security is defined by the fact that even if one retrieves the message from the image it’s still incomprehensible to get the original message without the two keys K1 and K2.
PDF Fulltext XML References Citation Report Citation
  •    Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
  •    High Capacity Triple Plane Embedding: A Colour Stego
  •    A New Steganography Algorithm against Chi Square Attack
  •    Rubik’s Cube: A Way for Random Image Steganography
  •    Kubera Kolam: A Way for Random Image Steganography
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    An Overview on Hiding Information Technique in Images
  •    On the Capacity and Security of Steganography Approaches: An Overview
  •    Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection
How to cite this article:

M. Padmaa, Y. Venkataramani and Rengarajan Amirtharajan, 2011. Stego on 2n:1 Platform for Users and Embedding. Information Technology Journal, 10: 1896-1907.

DOI: 10.3923/itj.2011.1896.1907






Curve Bottom