CFP last date
20 January 2025
Reseach Article

Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm

by Komal Patel, Sumit Utareja, Hitesh Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 13
Year of Publication: 2013
Authors: Komal Patel, Sumit Utareja, Hitesh Gupta
10.5120/10527-5510

Komal Patel, Sumit Utareja, Hitesh Gupta . Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm. International Journal of Computer Applications. 63, 13 ( February 2013), 24-28. DOI=10.5120/10527-5510

@article{ 10.5120/10527-5510,
author = { Komal Patel, Sumit Utareja, Hitesh Gupta },
title = { Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 13 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number13/10527-5510/ },
doi = { 10.5120/10527-5510 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:15.802687+05:30
%A Komal Patel
%A Sumit Utareja
%A Hitesh Gupta
%T Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 13
%P 24-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the most challenging aspects in the World Wide Web. In present time information sharing and transfer has increased exponentially. So to find out best solution this is providing necessary protection of our data against malicious attacks from intruders. Cryptography and Steganography are the two major techniques for secret communication. Cryptography converts information from its original form (plaintext) into unreadable form (cipher text); where as in steganography the secret message is hidden into the cover medium. There are many different techniques are available for cryptography and stagnography. In this paper two techniques BLOWFISH algorithm for cryptography and LSB approach for stagnography are used. First encryption of data is done by using BLOWFISH algorithm which is one of the most powerful techniques and then hide encrypted message using LSB approach. Our proposed model gives two layers of security for secret data.

References
  1. N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," IEEE Security and Privacy Mag. ", 2003, vol. 1, no. 3, pp. 32–44.
  2. William Stallings, "Cryptography and Network Security: Principles and practices", Pearson education, Third Edition, ISBN 81-7808-902-5.
  3. Harshitha K M and Dr. P. A. Vijaya , "secure data hiding algorithm using encrypted secret message" in International Journal of Scientific and Research Publications, Volume 2, Issue 6, June 2012.
  4. M. Grace Vennice, Prof. Tv. Rao, M. Swapna, Prof. J. Sasi kiran, " Hiding the Text Information using Stegnography" , in nternational Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 1, Jan-Feb 2012.
  5. Mr. Vikas Tyagi, " Data Hiding in Image using least significant bit with cryptography", in International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 4, April 2012
  6. Shailender Gupta, Ankur Goyal , Bharat Bhushan, " Information Hiding Using Least Significant Bit Steganography and Cryptography" , in I. J. Modern Education and Computer Science, june 2012
  7. Jawahar Thakur, Nagesh Kumar, " DES, AES and Blowfish : symmetric key cryptography algorithms simulation based performance analysis" ,in International Journal of Emerging Technology and Advanced Engineering Volume 1, Issue 2, December 2011.
  8. Dipti Kapoor Sarmah, Neha Bajpai , "Proposed System for data hiding using Cryptography and Steganography " in international gournal of computer applications,2010.
  9. Ankita Agaral , "Security Enhancement Scheme for Image Steganography using S-DES Technique" in International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 4, April 2012.
  10. Phad Vitthal S. , Bhosale Rajkumar S. , Panhalkar Archana R. , " A Novel Security Scheme for Secret Data using Cryptography and Steganography" in I. J. Computer Network and Information Security, March 2012.
  11. Gurjeevan Singh, Ashwani Kr. Singla, K. S. Sandha , "Superiority of Blowfish Algorithm in Wireless Networks", in International Journal of Computer Applications Volume 44– No11, April 2012
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Stenography LSB BLOWFISH Encryption Decryption