High Security of Data Using Steganography with Hybrid Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

With the modern technology in communication, there need some security on computer network. This security is one of the significant problem in tha data communication. Steganography is the art of hiding the message such that its presence cannot be detected. Message or encrypted message is hidden in the other carrier object before passing it through the network. In the existing system, for hiding the data only one technique is used i.e. steganography with X-box. In this paper, we will use 4 X-box technique which will hide 3 secret bit in each pixel of 24 or 32 bit cover image with hybrid algorithm i.e. AES and SHA-512. This will improve the security and PSNR value.

Keywords: X-Box technique, LSB, network security, AES, SHA-512

Edition: Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

Share this Article

How to Cite this Article?

Madhugeeta Verma, Poonam Dhamal, "High Security of Data Using Steganography with Hybrid Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151226, Volume 4 Issue 11, November 2015, 2469 - 2473

110 PDF Views | 91 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'LSB'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Similar Articles with Keyword 'network security'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Similar Articles with Keyword 'AES'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1122 - 1125

Analysis of End-to-End Delay in Vehicular Networks

Priyali Pukale, Poonam Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1395 - 1399

Improvement in Apriori Algorithm with New Parameters

Reeti Trikha, Jasmeet Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2888 - 2890

Use of Advanced Encryption Standard to Enhance the Performance of Geo Protocol in Location Based Network

Pranjala G Kolapwar, Prof. H. P. Ambulgekar

Share this Article

Similar Articles with Keyword 'SHA-512'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 478 - 482

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 680 - 683

Secure Image Based One Time Password

Neha Vishwakarma, Kopal Gangrade

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this Article
Top