Skip to main content

Secure Data Transmission Through Steganography using AES Algorithm

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 11 Issue: 04 | Apr 2024

p-ISSN: 2395-0072

www.irjet.net

Secure Data Transmission Through Steganography using AES Algorithm Mrs. Rinkal Bari1, Ms. Saloni Bhosale2, Tanvi Raut3, Sanyuti Sankhe3 234Information Technology, Theem College Of Engineering, Mumbai, India

1Professor, Department Of Information Technology, Theem College of Engineering, Boiser, Maharashtra, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract

-

that even if the hidden information is discovered, its content remains unintelligible without the corresponding decryption key. AES employs a symmetric key block cipher, offering a high level of security and speed suitable for real- time data transmission scenarios. It aims to explore the theoretical underpinnings of combing steganography and AES presenting a detailed analysis of their synergy in achieving secure data transmission. The proposed methodology involves embedding confidential data within cover objects using steganography techniques and subsequently encrypting the composite data using the AES algorithm.

Secure Data Transmission Through Steganography using AES Algorithm is the art of hiding the fact that communication is taking place, by hiding information in other information. Different application has different requirements of the steganography techniques used. It may require absolute invisibility of the secret information, while other requires a largest secret message to be hidden. On the other side receiver download the stego image and using the software retrieve the secret text hidden in the stego image. It allows use to choose the bits for replacement from the image then sender select the cover image with the bit replacement choice it helps to generate the secure stego image. It consists of three element cover image which hides the secret image, the secret image and the steganos image which is covered by object with embedded message inside in it. The origin of the term is steganos means secret and graphy means writing. It means hiding one piece of data within another. It is the practice of concealing a file, message, image or video within another files, images, messages or video. This security is available by encrypting the information that is transferred in the image and again encrypting the image that has the data using the AES algorithm. Secure data transmission refers to transfer the data such as confidential information over a secure channel.

2. LITERATURE SURVEY Data encryption is the technique for secure sharing of data. These days, hackers employ certain algorithm or other methods to decode the data that senders have encoded. Making ensuring data is hidden from hackers is one technique to guarantee security. In today society people are willing to spend thousands of dollars to guarantee a highlevel information security. Hackers are developing with the technology that is used to secure data, as it advances. Data security is crucial in the internet and networking driven world of today. An overview of secure data transmission through steganography using AES algorithm to provide high quality of data security and transfer of data from source to destination. It should be capable of identifying the authorized and unauthorized users. It should be capable of embedding text message into image file, audio, file and video file. By employing various steganographic techniques such as whitespace manipulation, format-based encoding, wordbased alterations, or grammar-based modifications, text steganography ensures that the embedded message remains inconspicuous and undetectable to unintended recipients. Text steganography holds significance in scenarios where overt encryption methods may raise suspicion or attract unwanted attention. It provides a discreet means of communication, particularly in contexts where privacy and secrecy are paramount.

Key Words: Steganography; Image; Text; Data Hiding; Information Hiding; Encryption; Decryption; LSB; AES

1.INTRODUCTION Ensuring the confidentially and integrity of sensitive information has become crucial in the world of data transfer and communication. Strong and secure procedures to protect data during transmission are becoming more and more important as digital communication spreads. This field of secure data transfer suggests a new method that combines the power of Advanced Encryption Standards AES encryption with the steganography strength. By obscuring the existence of sent data, steganography the practice of hiding information among other seemingly innocent data adds another degree of protection. This means of convert communication improves the data transmission confidentially. Steganography combined with the AES algorithm a popular and extensively used symmetric encryption standard forms a complete solution for protecting confidential data. The Advanced Encryption Standard, chosen for its robustness and efficiency, ensures

© 2024, IRJET

|

Impact Factor value: 8.226

2.1 Existing paper We presented an overview of the steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of

|

ISO 9001:2008 Certified Journal

|

Page 2303


Turn static files into dynamic content formats.

Create a flipbook
Secure Data Transmission Through Steganography using AES Algorithm by IRJET Journal - Issuu