Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program (original) (raw)
Related papers
Secure Data Transfer Using Image Steganography
IJRASET, 2021
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications. I.
Novel Steganography Method for Secure Data Transmission
International journal of engineering research and technology, 2017
Steganography is the art of hiding information to prevent the detection of hidden messages. Cryptography can be defined as the conversion of plain text into a scrambled code. Both are two general ways of sending vital information in a secret way. A message in scrambled code aka cipher text, might arouse suspicion on the part of the recipient while an invisible message created with steganographic methods will not. But many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for a steganographic message. In this paper, we present a new steganographic technique to hide data inside an image. The newly planned technique withstands visual and statistical attacks, yet it still offers a large steganographic capacity. This method does not modify the image. Message to be hidden will be converted into a bit stream and divided into several blocks. The bit pattern of each block is identified inside the im...
A Technique To Hide Information Within Image File For Secure Transmission
In today's world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm.
SECURE DATA TRANSFER OVER INTERNET USING IMAGE STEGANOGRAPHY
OYETORO ADEOLU AUSTINE, 2017
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing the security of data using Steganography. In this technology, the end-user identifies an image that is going to act as the carrier of data. The data file is encrypted and authenticated. This message is hidden in the image. The image if hacked or intercepted by a third-party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image.
IJERT-Application of Steganography and Cryptography for Secured Data Communication – A Review
International Journal of Engineering Research and Technology (IJERT), 2016
https://www.ijert.org/application-of-steganography-and-cryptography-for-secured-data-communication-a-review https://www.ijert.org/research/application-of-steganography-and-cryptography-for-secured-data-communication-a-review-IJERTV5IS040354.pdf The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. Several techniques such as steganography and cryptography have been employed to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and steganography has proven to have taken data communication security to another level. In this work, a review of these techniques is presented with major focus on two journals titled "Dual Layer Security of Data Using LSB Image Steganography Method and AES Encryption Algorithm" [1] and "An Efficient Data Hiding Scheme Using Steganography and Cryptography Technique" [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques could improve security of data communication beyond the present levels if properly combined with little or no performance degradation.
international journal for research in applied science and engineering technology ijraset, 2020
Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others. Therefore, the goal is to hide the existence of the secret data. Using steganography techniques, secret data can be concealed within an appropriate multimedia carrier, such as, image, audio, text files; among which digital image is the most widely used carrier format. Different steganography techniques are available, some are more advanced than the others, having strong and weak points respectively. The suitable technique can be selected as per the application requirement. The main objectives of steganography are undetectability, untraceable, robustness, and capacity of secret data. These are the factors that make it different from techniques such as cryptography. This paper analysis the uses of steganography and its techniques. It additionally aims to determine which steganography technique is more suitable for a certain application.
Analysis of Different Steganographic Algorithms for Secured Data Hiding
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego -image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless -there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.
Model for Data Hiding Using Steganography
Steganography is a technique to secure a data communication. Data form Message, secured by inserting message bits into carrier bit files. One of Method for inserting messages in carrier files is the Least Significant Bit method. Inserting the message bits in the carrier bit file bit. Generally, this report discussed designing of steganography applications that modified 2 bits of carrier file using LSB Method. There was some testing to be performed on this application, such as embedding and retrieving process testing to know functionality application, capacity testing to know cooperation carrier sizes before and after message embedded, and quality testing by using PSNR formula to know stegano file quality. Testing conducted includes testing the sending and receiving messages that have been inserted message. From the test, it can be concluded that the data PIN (Personal Identifier Number) inserted cannot be opened by unauthorized parties and accepted banking customers when receiving an ATM card or credit card.
Secure Data Transfer through a Combination of Steganographic and Cryptographic Encryption Technique
International journal of multidisciplinary and current research, 2015
Security for information has become a great concern in today’s internet era. Thus sending sensitive information from one end to another end via common communicating channel has become inevitable. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper aims at studying popular encryption techniques and their drawbacks due to which they could not be put to practical use along with a proposed method of successfully encrypting information both in image and text format combing their successful delivery to the destination using steganographic and cryptographic techniques of information encryption
Implementation of digital Steganography using image files-a Computational approach
The main aim of this paper is to hide the message along with the existence of communication so that the attacker can"t even get the encrypted message. The procedure follows as hiding the encrypted message in image files by embedding the message bits into least significant bit positions of each byte of image file. In image file each pixel is represented with 24 bits which is a combination of RED, BLUE, GREEN color proportions for that pixel.LSB has least importance in image files so it"s modification can"t results in a human detectable change. Here Data Encryption Standard (DES) algorithm is used to encrypt the message and MD5 algorithm is used to compute the message digest which is used to check the integrity of message. After performing Cryptographic functions message is compressed with GZip compression technique and then it is embedded into image file. This process results in a stego file (output image file) which is exactly similar to cover file (input image file).