Secure Multimedia Data Transfer using Crypto and Stegano Algorithms

B. Sailaja*, K. Meghana**, S. Harika Damayanthi***, S. Sandhya****, V. Satya Sushma*****
*-***** Department of Computer Science and Engineering, Vignan's Institute of Engineering for Women, Visakhapatnam, India.
Periodicity:April - June'2022
DOI : https://doi.org/10.26634/jse.16.4.18820

Abstract

Recent developments in Steganalysis have made it difficult to secure personal content, messages, or digital images using steganography. Using Steganalysis can easily reveal the presence of hidden information in storage files. This paper presents a new Steganographic approach to communication between two individuals. The approach presented in this paper uses both Steganographic and cryptographic methods. Cryptography uses Rivest–Shamir–Adleman (RSA) and Steganography use image Steganography to hide data. It also uses the mutual authentication process to satisfy all services in the field of cryptography, i.e., access control, confidentiality, integrity, and authentication. In this way, it can store data more securely. Since it uses the RSA algorithm to protect the data again, it performs Steganography to hide the data in the image. Thus, any other person on the network cannot access the data present on the network. Only the sender and receiver can extract the message from the data.

Keywords

Rivest-Shamir-Adelman (RSA), Cryptography, Steganography.

How to Cite this Article?

Sailaja, B., Meghana, K., Damayanthi, S. H., Sandhya, S., and Sushma, V. S. (2022). Secure Multimedia Data Transfer using Crypto and Stegano Algorithms. i-manager’s Journal on Software Engineering, 16(4), 9-16. https://doi.org/10.26634/jse.16.4.18820

References

[1]. Abdulzahra, H., Ahmad, R., & Noor, N. M. (2014). Security enhancement, Combining cryptography and steganography for data hiding in images. Applied Computational Science, (pp. 978-960).
[2]. Ahaiwe, J. (2014). Document security within institutions using image steganography technique. International Journal of Science and Research (IJSR), 2319-7064.
[3]. Ekatpure, P. R., & Rutuja, N. B. (2013). A Comparative Study of Steganography & Cryptography. International Journal of Science and Research (IJSR).
[4]. Kartik, J. V., & Reddy, B. V. (2013). Authentication of secret information in image steganography'. International Journal of Latest Trends in Engineering and Technology, 14(6), 97-104.
[5]. Kumar, R. P., Hemanth, V., & Shareef, M. (2013, March). Securing information using sterganoraphy. In 2013, International Conference on Circuits, Power and Computing Technologies (ICCPCT) (pp. 1197-1200). IEEE. https://doi.org/10.1109/ICCPCT.2013.6528930
[6]. Rajyaguru, M. H. (2012). Crystography-combination of cryptography and steganography with rapidly changing keys. International Journal of Emerging Technology and Advanced Engineering, 2(10), 2250-2459.
[7]. Seth, D., Ramanathan, L., & Pandey, A. (2010). Security enhancement: combining cryptography and steganography. International Journal of Computer Applications, 9(11), 3-6.
[8]. Shetty, N. (2017). Steganography for Secure Data Transmission. International Journal of Computational Intelligence Research, 13(10), 2289-2295.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.