IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Hiding in Color Image Using Steganography and Cryptography to Support Message Privacy

Data Hiding in Color Image Using Steganography and Cryptography to Support Message Privacy
View Sample PDF
Author(s): Sabyasachi Pramanik (Haldia Institute of Technology, India), Ramkrishna Ghosh (Haldia Institute of Technology, India), Digvijay Pandey (Department of Technical Education, India & Institution of Engineering and Technology, India)and Mangesh M. Ghonge (Sandip Institute of Technology and Research Centre, India)
Copyright: 2021
Pages: 30
Source title: Limitations and Future Applications of Quantum Cryptography
Source Author(s)/Editor(s): Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India)and Raees Ahmad Khan (Indian Institute of Information Technology, India)
DOI: 10.4018/978-1-7998-6677-0.ch011

Purchase

View Data Hiding in Color Image Using Steganography and Cryptography to Support Message Privacy on the publisher's website for pricing and purchasing information.

Abstract

The immense measure of classified information has been moved on the internet. Information security turns out to be progressively significant for some applications, for instance, private transmission, video observation, military, and clinical applications. Lately, there has been a great deal of enthusiasm for steganography and steganalysis. Steganography is the specialty of covering up and transmitting information through clearly harmless transporters with an end goal to disguise the presence of information. The advanced picture information, for example, BMP, JPEG, and GIF, are generally utilized as a transporter for steganography. Here the mystery message is implanted into a picture (or any media) called spread picture and afterward sent to the beneficiary who extricates the mystery message from the spread message. This picture ought not to be discernible from the spread picture, with the goal that the aggressor can't find any implanted message. The authors have proposed three approaches of steganography that can easily support message privacy.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom