CFP last date
20 January 2025
Reseach Article

An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique

by Richa Singh, Amit Kumar Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 19
Year of Publication: 2015
Authors: Richa Singh, Amit Kumar Sharma
10.5120/20659-3308

Richa Singh, Amit Kumar Sharma . An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique. International Journal of Computer Applications. 117, 19 ( May 2015), 1-5. DOI=10.5120/20659-3308

@article{ 10.5120/20659-3308,
author = { Richa Singh, Amit Kumar Sharma },
title = { An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 19 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number19/20659-3308/ },
doi = { 10.5120/20659-3308 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:47.225558+05:30
%A Richa Singh
%A Amit Kumar Sharma
%T An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 19
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the science and art of encrypting and decrypting text data where Steganography is the science and art of hiding information. Steganography deals with composing hidden message so that only the sender and receiver know that the message even exists. A novel approach i. e. CryptSteg is introduced where sender embedding text message in the picture and send it to the receiver. In this approach the algorithm of cryptography and Steganography is combined. Firstly the text message is encrypted and this encrypted message is then embedded in an image using a new Steganography algorithm. The image are partitioned in the ten level block, and the text data will be embedded into ten diagonal or linear sub block values which is depend upon key. The quality of produced image is better using the median filter while using this algorithm.

References
  1. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and Nii Narku Quaynor- " A New Cryptographic Encryption Algorithm for Securing Digital Images", International Journal of Computer Applications (0975 – 8887),Vol. no. 94 – No. 19, May 2014.
  2. Andreas Westfeld and Andreas Pfitzmann, "Attacks on Steganographic Systems Breaking the Steganographic Utilities" EzStego,Jsteg,Steganos, and S-Tools—and Some Lessons Learned.
  3. Sakthisudhan K. , Prabhu P. , Thangaraj P. , and "Secure Audio Steganography for Hiding Secret Information" International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012) Proceedings published in International Journal of Computer Applications® (IJCA).
  4. Sharmah Deepti Kapoor, Bajpai Neha, "Proposed system for data hiding using cryptography and staganography", International Journal of Computer Applications (0975 – 8887) Volume 8– No. 9, October 2010.
  5. Omolehin J. O, Abikoye O. C, Bahej A. O , "Time Complexity of 4 Row Rail Fence Cipher Encryption Algorithm", International Journal of Mathematical science, vol-1,nov-1,2009.
  6. Anwar h. ibrahim, Waleed M. Ibrahim, "Text Hidden in Picture Using Steganography: Algorithms and Implications for Phase Embedding and Extraction Time", International Journal of Information Technology & Computer Science (IJITCS) (ISSN No: 2091-1610) Volume 7: No: 3: Issue on January / February, 2013.
  7. ABDESSAMAD BEN HAMZA, PEDRO L. LUQUE-ESCAMILLA, "Removing Noise and Preserving Details with Relaxed Median Filters", Journal of Mathematical Imaging and Vision 11, 161–177 (1999) °c 1999 Kluwer Academic Publishers. Manufactured in the Netherland.
  8. V. Lokeshwara Reddy,Dr. A shubramanyam, Dr. P Chenna Reddy"A New LSB Matching Steganography Method Based on Steganography Information Table, Int. J. Advanced Networking and Applications, Vol: 02, Issue: 05, Pages: 868-872 (2011).
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Encryption LSB