Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Iraq | Volume 4 Issue 6, June 2015

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Secure transmissions of information become a critical issue in the digital world with the growing importance of the internet. Cryptography and steganography helps in providing this much-needed data confidentiality. This research presented an improved steganographic method for hiding secure data. The proposed system is incorporating of text encryption, steganography and data compression based on an efficient keystream generator. In the first step, the secret data has been encrypted using stream cipher. This cipher text is embedded into BMP image format cover using pseudorandom keystream generator as a private key. Then the image file transmitted is compressed by using discrete cosine transform to obtain the JPEG image format. The experimental results show that the proposed method is provide improved robustness, security due to multi-level security and the use of the efficient keystream generator increases the complexity of the encryption process.

Keywords: Cryptography, Image Steganography, Data Compression, Keystream Generator

Edition: Volume 4 Issue 6, June 2015

Pages: 627 - 631

Share this Article

How to Cite this Article?

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas, "Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155237, Volume 4 Issue 6, June 2015, 627 - 631

118 PDF Views | 93 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Similar Articles with Keyword 'Image Steganography'

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Research Paper, Information Technology, Myanmar, Volume 2 Issue 1, January 2013

Pages: 227 - 230

Message Embedding In PNG File Using LSB Steganographic Technique

Wai Wai Zin

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article

Similar Articles with Keyword 'Data Compression'

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1777 - 1781

A Secure Approach for Deduplication using Hybrid Cloud

Yusuf Aliyu Adamu

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article
Top