Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016

Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography

Sayli S. Relekar, V. B. Raskar

Now a days the use of internet has been increased very much. Confidential data is been exchange over internet and various media file are also been exchange over internet. To keep these confidential data and media file secure over internet, then the cryptography and steganography technique are used to secure the data. So in this paper we are use various cryptography technique and steganography technique. Cryptography technique is use to encrypt the data. Steganography technique is use to hide the data within the selected image.. For that, we first substitute the original message by using the fourteen square substitution algorithms. After the substitution of text, we then encrypt this text message using RSA algorithm. The encrypted message compressed by JPEG 2000 (Huffman coding) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DWT (Discrete Wavelet Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. At the receivers end, same operations are performed to decrypt the original message in reverse order. It is found that here we are using the double ciphering techniques which makes the system very robust and secures it from known hacking attacks. It makes very difficult for the intruders to hack the image and then decrypt the message in a feasible amount of time thus securing it from many known network attacks.

Keywords: Encryption, steganography, cryptography, compression technique, RSA

Edition: Volume 5 Issue 12, December 2016

Pages: 1124 - 1126

Share this Article

How to Cite this Article?

Sayli S. Relekar, V. B. Raskar, "Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20163604, Volume 5 Issue 12, December 2016, 1124 - 1126

95 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 779 - 782

High Speed Advanced Encryption Standard Using Pipelining

Mradul Upadhyay, Utsav Malviya

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael?s Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1116 - 1120

QR Code Based Data Transmission in Mobile Devices Using AES Encryption

Ajini Asok, Arun G.

Share this Article

Similar Articles with Keyword 'steganography'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2200 - 2202

Security Enhanced RDH Image Steganography by RRBE

Saranya.M, Aswani.K

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather, Er. Megha Goyal

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1804 - 1807

LSB and DCT Steganographic Detection Using Compressive Sensing

Anju.C.K, Lekshmy.S

Share this Article

Similar Articles with Keyword 'cryptography'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 878 - 884

ASIC Architectures for Implementing ECC Arithmetic over Finite Fields

Hemanth Ravindra, Jalaja S

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2710 - 2713

Secret Hiding Using Visual Cryptography

Rahul Gupta

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

Similar Articles with Keyword 'compression technique'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1490 - 1494

Real Time Video Image Acquisition Sensing and Decompressing Reconstruction in hardware Using ARM9

Ravvarapu Naveen Kumar, Prasana Murali Krishna

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1020 - 1025

Performance Analysis of Hybrid Multilevel DWT Coding for Optimum Quantization Factor Determination

Rashmi Singh, Sugandha Agarwal

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1124 - 1126

Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography

Sayli S. Relekar, V. B. Raskar

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 4, April 2016

Pages: 884 - 887

Fingerprint Compression using Singular Value Decomposition

Kiran B. Khedkar, Prof. A. S. Deshpande

Share this Article

Research Paper, Electronics & Communication Engineering, China, Volume 5 Issue 9, September 2016

Pages: 1196 - 1200

Medical Image Compression by Using Discrete Haar Wavelet Transform

Abasi Julius

Share this Article

Similar Articles with Keyword 'RSA'

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael?s Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2482 - 2487

Robust Recovery of Data in Multiple Sink Wireless Sensor Network

Jyothi.K, Sridhar K

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3221 - 3230

Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics

Shahina M. Salim, Sonal A. Lakhotiya

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2225 - 2228

Smart Dust Network for Tactical Border Surveillance System

J. Natarajan, V. Prabhakaran

Share this Article

Research Paper, Electronics & Communication Engineering, Egypt, Volume 5 Issue 4, April 2016

Pages: 2089 - 2093

Design of Switched Resistor ?? ADC Using VHDL-AMS Tool

Ahmed Osman Hamaad, Mohyldin A. Abo-Elsoud, A. M. Abo-Talib

Share this Article
Top