International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 108

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma | Poonam Dhamal


Abstract: With the modern technology in communication, there need some security on computer network. This security is one of the significant problem in tha data communication. Steganography is the art of hiding the message such that its presence cannot be detected. Message or encrypted message is hidden in the other carrier object before passing it through the network. In the existing system, for hiding the data only one technique is used i. e. steganography with X-box. In this paper, we will use 4 X-box technique which will hide 3 secret bit in each pixel of 24 or 32 bit cover image with hybrid algorithm i. e. AES and SHA-512. This will improve the security and PSNR value.


Keywords: X-Box technique, LSB, network security, AES, SHA-512


Edition: Volume 4 Issue 11, November 2015,


Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm


How to Cite this Article?

Madhugeeta Verma, Poonam Dhamal, "High Security of Data Using Steganography with Hybrid Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV151226, Volume 4 Issue 11, November 2015, 2469 - 2473, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'LSB'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare [2] | Prof. Anil Gujar

Share this Article


Top