E.g.: Credit card numbers, bank statements, patient medical records and history, etc. We live in the world of Internet, the Age of Information Technology where a large amount of private and confidential information is being stored, processed and transmitted. Keywords: Cover-Image, Secret-Image, Stego-Image, AES. Our system makes the combined use of the two data hiding techniques i.e., Cryptography and Steganography that allows the user to compress the Secret-Image using Zipped compression followed by AES 128/192/256 encryption and hiding the same into other Cover-Image thus providing high level of secrecy and security. As a result a new domain dealing with security of data has evolved and is known as Information Hiding. This has given rise to the need of secret communication. So it is necessary to maintain the confidentiality and the integrity of this data. Such data has become susceptible to copyright infringement, eavesdropping, and hacking, cracking and other kind of unauthorized access. Security Improvisation in Steganography using AES 128/192/256ĭepartment of Computer Science and Engineering,ĭepartment of Computer Science and Engineering, JNEC, Aurangabad, India.Ībstract We live in the world of Internet, the Age of Information Technology where a large amount of private and confidential information is being stored, processed and transmitted.
0 Comments
Leave a Reply. |