International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 04 | Apr -2017
p-ISSN: 2395-0072
www.irjet.net
“A Review Of Hiding Technique To Developing A Secure System: Dual Steganography” Babita1, Gurjeet Kaur2 1M.Tech
2Assistant
Scholar, Department of Computer Science &Engineering, S.B.B.S.U, Jalandhar, Punjab, India Professor, Department of Computer Science & Engineering, S.B.B.S.U, Jalandhar, Punjab, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the rapid advance in digital network,
privacy etc. so it is most important topic in the current time. [2]. For hiding and detecting the data or information as more and more techniques are developed For protecting confidential data from intruders or hackers it is necessary to develop a strong new technique [2]. The two important techniques for providing security are cryptography and steganography. Both are well-known and widely used techniques which used for information security for confidentiality of data exchange.
information technology and digital communication has become very important to secure information transmission between the sender and receiver. Security is the important features in communication and other text information because of the intruders who wait for attack on data and chances to access the private information. There are two important type of techniques which provide securities are cryptography and steganography. Both are well-known and most important techniques which are used methods in information security for confidentiality of data exchange. One technique is cryptography, where the sender uses an encryption key to encrypt the message, this encrypted message is transmitted through the insecure public media, and decryption algorithm is used to decrypt the data/message with using key. The reconstruction of the original message/data is possible only if the receiver has the decryption key to use for decryption for recover the hidden message. The second method is steganography, where the hidden message is inserted in another object while using the algorithms. There are different kinds of cryptographic and steganography technique so we used different combinations of cryptography and steganography. Dual steganography is the security in which steganography and cryptography both are used together i.e. combine use of both techniques. In this paper we are comparing the different combinations of both cryptography and steganography which is based on their security. We are focused on digital image based steganography i.e. the cover medium is digital image.
1.1 Steganography Steganography is the technique of embedding hidden messages /data in such a way that no one can detect the existence of the messages, except the sender and intended receiver(s). The main aim of steganography is to hide the secret message or information in such a way that no one is able to detect it. If they found any suspicion data, then goal is defeated [1]. The various types of data in steganography can be audio, video, text and images etc. The basic model of Steganography consists of three components: The Carrier image: The carrier image is also called the cover object that will carry the message/data which is used to be hidden. The Message: A message can be anything like data, file or image etc. The Key: A key is used to decode/decipher the hidden message.
key
Key Words: Cryptography, Steganography, Digital Network, Confidentiality Carrier Image
1. INTRODUCTION In the present era, Security of information is one of the most important factors of information technology and communication. The internet is an important part for communication and information sharing. Every person wants their communicating data to be secret and safe. Any organization who deals with confidential data whose first priority is sending the safe and secure messages to other. Almost all information hiding techniques are used for military, internet banking, intelligence agencies and for
© 2017, IRJET
|
Impact Factor value: 5.181
Stego object
Steganography tool
Message to hide
Fig -1: Basic Model Of Steganography
|
ISO 9001:2008 Certified Journal
|
Page 740