International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121

Research Paper | Information Technology | Iraq | Volume 4 Issue 6, June 2015


Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali | Salah T. Allawi | May M. Abbas


Abstract: Secure transmissions of information become a critical issue in the digital world with the growing importance of the internet. Cryptography and steganography helps in providing this much-needed data confidentiality. This research presented an improved steganographic method for hiding secure data. The proposed system is incorporating of text encryption, steganography and data compression based on an efficient keystream generator. In the first step, the secret data has been encrypted using stream cipher. This cipher text is embedded into BMP image format cover using pseudorandom keystream generator as a private key. Then the image file transmitted is compressed by using discrete cosine transform to obtain the JPEG image format. The experimental results show that the proposed method is provide improved robustness, security due to multi-level security and the use of the efficient keystream generator increases the complexity of the encryption process.


Keywords: Cryptography, Image Steganography, Data Compression, Keystream Generator


Edition: Volume 4 Issue 6, June 2015,


Pages: 627 - 631


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas, "Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 627-631, https://www.ijsr.net/get_abstract.php?paper_id=SUB155237

Similar Articles with Keyword 'Cryptography'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson | Jesline Abraham

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1117 - 1121

Cryptocurrency Financial Risk Analysis using Machine Learning

Tanya Kapoor | Laxmi Ahuja

Share this Article
Top