A Steganography Algorithm and Cryptography Techniques for Hiding Image
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 3, March 2018

A Steganography Algorithm and Cryptography Techniques for Hiding Image

Zanbaq Hekmet Thanon

Steganography can be defined as the procedure of hiding a type of communication medium (i.e. text, audio or image) inside another type of medium. This paper will be discussing (Proposed system, utilizedforhiding and extracting the information. The Proposed system embeds a text within an image. Each of the sender and the receiver dont need exchanging any information prior to using the system, therefore, it can also be said that the system is purely steganographic. This paper discusses producing a stego-image so that the embedded message cannot be perceived by a random observer but can be noticed easily by the intended receiverthatknowsthe way of extracting the message. Proposed system has the goal of preventing the detection of a secret message. It is a technique to embed a text inside harmless cover-image (we used GIF, JPG and BMP image formats), and produce the stego-image (BMP image format) without making any visible changes to it. We can check the histogram for each of the cover and stego-images to verify if there is any different between them. The implementation results via MATLAB ver.8.1 package

Keywords: Cryptography, Steganography, Stego- image, GIF, JPG, BMP, GUI, LSB

Edition: Volume 7 Issue 3, March 2018

Pages: 990 - 994

Share this Article

How to Cite this Article?

Zanbaq Hekmet Thanon, "A Steganography Algorithm and Cryptography Techniques for Hiding Image", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2018566, Volume 7 Issue 3, March 2018, 990 - 994

55 PDF Views | 56 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 567 - 571

Wi-Fi security using Elliptical Curve Cryptography

Karim Shahajhan Mulani, Nimbalkar Ravi Ramchandra

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Similar Articles with Keyword 'Stego- image'

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 2, February 2015

Pages: 588 - 591

Suitable Data Hiding Technique for Windows Phone

Zainalabideen Abdual Samad Rasheed

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 3, March 2018

Pages: 990 - 994

A Steganography Algorithm and Cryptography Techniques for Hiding Image

Zanbaq Hekmet Thanon

Share this Article

Similar Articles with Keyword 'GIF'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 858 - 863

Implementing the Supporting Privacy Protection in Customized net Search

N. Rajendran, N. Prakash

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1684 - 1686

Secure Data Sharing In Multi-Owner for Dynamic Groups in Cloud

J. Pratheeka, Dr. M. Nagaratna

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 979 - 982

Delay-Tolerant Bulk Information Transfers on the Web

A. Amarnath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 247 - 250

Improved Clustering Based Routing Protocol for Wireless Sensor Networks

Naziya Naved Shaikh, Dr. M. U. Kharat

Share this Article

Similar Articles with Keyword 'JPG'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 3, March 2018

Pages: 990 - 994

A Steganography Algorithm and Cryptography Techniques for Hiding Image

Zanbaq Hekmet Thanon

Share this Article

Similar Articles with Keyword 'BMP'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2363 - 2367

Preprocessing and Similarity Matching Trademark Images Based on Color and Shape

Preeti Patel, Ajay Kr Indoria

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 3, March 2018

Pages: 990 - 994

A Steganography Algorithm and Cryptography Techniques for Hiding Image

Zanbaq Hekmet Thanon

Share this Article

Similar Articles with Keyword 'GUI'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 473 - 475

Data Mining for Sales Prediction in the Tourism Industry

Pratiksha Jain, N. Partheeban, Rajkumar R.

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2953 - 2955

Probabilistic Frequent Sequential Patterns Analysis Using Apriori of Unsure Databases

Madhavi G. Patil, Ravi Patki

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1166 - 1171

Literature Survey on a New Advanced Refactoring Based Approach for Parallelism Using Heterogeneous Parallel Architectures

Shanthi Makka, Bharat Bushan Sagar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2373 - 2376

An Ontology-Based Text Mining Method to Develop D-Matrix

Poonam Jagdale, Devendra P Gadekar

Share this Article

Similar Articles with Keyword 'LSB'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi, Maryam Safaei Rizi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Survey on Digital Watermarking

Jyoti, Jyoti Rani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 198 - 201

Comparison of PNG & JPEG Format for LSB Steganography

Bharat Sinha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article
Top