SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD38067 | Volume – 5 | Issue – 1 | November-December 2020 Page 864
Secure Message Transmission using
Image Steganography on Desktop Based
Sidharth Sai S1, N. Priya2
1PG Student, 2Assistant Professor,
1,2Department of MCA, Jain Deemed-to-be-University, Bangalore, Karnataka, India
ABSTRACT
The rapid increase in our technology has made easier for us to send and
receive data over internet at most affordable way. There are many
transmission medias like emails, facebook, twitter, etc… whichledwayforthe
intruders to modify and misuse the information what we share over the
internet. So in order to overcome these kinds of issues many methods has
been implemented such as Cryptography, Steganography and Digital
watermarking to safeguard our data transmissions in a most prominent way.
In this paper, hiding text inside a digital image using Stegano tool for secure
data transmissions has been described.
KEYWORD: Cryptography, Steganography, Stegano tool
How to cite this paper: Sidharth Sai S | N.
Priya "Secure Message Transmission
using Image Steganography on Desktop
Based" Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-1,
December 2020,
pp.864-866, URL:
www.ijtsrd.com/papers/ijtsrd38067.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
As the current generation is getting developed, internet has
become one of the most essential thing that every human
needs now and then. With the invention of internet, life
became more comfortable and ease. In today’s generation,
the technologies have reached to a great extent where
internet is being used as a primary medium by each and
every individuals to transfer data’s, medias and information
from one point to another across the biosphere. There are
many transmission methods to transfer information using
the internet via emails, facebook, whatsapp, etc which
focuses on point to point transmission making the work to
complete really fast and accurate.
But one of the main and major problems what we are facing
during data transmissions and communications over
internet is security threat. During these data transmissions,
our sensitive information’s gets intruded by third party in
many ways. Therefore, it becomes a significant factor in
safeguarding our medias during the transmission.
Taking this data security into consideration, as data security
prevents unauthorized users/hackers from accessing one’s
files, many security techniques has beendevelopedinrecent
times which includes cryptography, steganography and
digital watermarking.
Steganography is a practice of hiding text message into an
image file, audio file or video files for safe point to point data
transmissions.
People often gets confused between steganography and
cryptography. Both techniques are implemented to provide
security for data transmissionsbutcryptographyisa method
which uses encryption and decryption phase in form of
cipher text blocks. This cipher text generation gets differed
depending on the algorithms we use such as AES, RSA, etc….
Whereas the Steganography techniques hides a text inside
many media formats which ll be seen as a normal image,
audio or video when a data transmission is done. So, if a
person views the article, then he/she has no idea that there
is a hidden text inside, therefore he/she won’t indulge to
decrypt the evidences.
Existing system
For transmission of data from one point to another, many of
us use cryptographic technique. This techniquecanbeeasily
recognized and intruded by the middle men. Though crypto
techniques provide security for data transmission, it can be
easily gathered and our information gets leaked. It doesn’t
provide much security to the user until and unless a deep
and more prominent algorithm is used. So to overcomefrom
such existences, this STEGANOGRAPHY technique can be
used.
Problem statement
When it comes to data transmission, there arises a question
“How to do secure transmission”. In order to overcome this
issue, steganography techniques comes into action which
IJTSRD38067
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD38067 | Volume – 5 | Issue – 1 | November-December 2020 Page 865
hides our data inside several carrierssuchasimage,audioor
video files which becomes difficult for the the intruders to
gain authorization.
Proposed system
The main aim of the paper is to introduce a technique to
overcome unauthorized data access during point to point
transmissions over the internet. This is achieved through
Steganography technique which hides the text message
inside an image. This modified image looks similar to the
original image with no changes in its pixel quality and its
size. The encrypted image shared via social medias or other
formats shouldn’t be noted that there is a hidden message
embeded in it. By doing so, the act of stealing information
can be reduced since the middle men doesn’t recognize that
there is a message hidden inside the image when he/she
tries to intrude into it.
Past systems included lower embedding capacity and also
quality of the image was very poor.So,thisalgorithmcreated
a path for better image quality and embedding capacity.
When it comes to atmostsecurity,bothdata hidingalgorithm
and the image on which data is embedded should also be
equally secured. Therefore, the security system is
implemented in two layers, i.e the message that is to be
hidden inside an image isencryptedusingAESalgorithmand
this encrypted data is then hidden in the image. Again the
image with hidden data is encrypted. Therefore, the person
with the decryption key will have the full authorization to
retrieve the secret message in its original form.
AES algorithm
The Advanced Encryption Standard is a symmetric cipher
text block algorithm which is used to encrypt and decrypt
the information for security purposes.Itisconsideredasone
of the safest mode, hence it is used in worldwidestandard.It
is also known as Rijndael algorithm whosefunctionistotake
plain text in 128bit format and converts them into cipher
blocks using keys of 128,192 and 256bits.
Methodology
The proposed topic includes two modules:
Encrypt
Decrypt
Where the user has to first open and run the application.
Then the user has to select the image file in which he has to
hide the text and transfer to the other end. Then he has to
type the key format which is used to carry out the algorthim.
Later the text message which he has to send it to the other
end has to be typed in the required column
Once done, he/she will be given with two tabs – encrypt and
decrypt.
In ENCRYPT options, the text message which he/she wants
to transfer it to the other end will be embedded inside an
image.
In DECRYPT mode, the other end user once he receives the
encrypted image, he/she can decrypt the text image, save it
to the required path and can view the hidden message.
BLOCK DIAGRAM OF STEGANOGRAPHY
Conclusion
This system provides at most security since the intruder
doesn’t know that there is a message hidden inside the
image. Thus making him only torecovertheimagemaybe by
using his practical familiarity.
In the generation of in advance information swapping by
means of internet and World Wide Web, steganography has
developed lifeblood tool for information security.
Steganography can be ranked based on many ethics and one
among them is positioned on the type of cover media.
REFERENCES
[1] Kolakalur, Anush, Ioannis Kagalidis, and Branislav
Vuksanovic. "Wavelet Based Color Video
Steganography." International Journal ofEngineering
and Technology 2016.
[2] S. Song, J. Zhang, X. Liao, J. Du, and Q. Wen, “A Novel
Secure Communication Protocol Combining
Steganography and Cryptography”, Advanced in
Control Engineering and Information Science, Dec.
2011, pp. 2767-2772.
[3] Mstafa, Ramadhan J., and Khaled M. Elleithy. "A novel
video steganographyalgorithminthe waveletdomain
based on the KLT tracking algorithm and BCH codes."
Systems, Applications and Technology Conference
(LISAT), 2015.
[4] Vidhya, P. M., and Varghese Paul. "A Method for Text
Steganography Using Malayalam Text." Procedia
Computer Science 46 , pp 524-531, 2015.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD38067 | Volume – 5 | Issue – 1 | November-December 2020 Page 866
[5] Mstafa, Ramadhan J., and Khaled M. Elleithy. "An
Efficient Video Steganography Algorithm Based on
BCH Codes." 2015.
[6] Satpute, Snehal, et al. "An Approach towards Video
Steganography Using FZDH (Forbidden Zone Data
Hiding)." 2015.
[7] Jenifer, K. Steffy, G. Yogaraj, and K. Rajalakshmi. "LSB
Approachfor VideoSteganographytoEmbedImages."
International Journal of Computer Science and
Information Technologies 2014.
[8] M. R. Islam, A. Siddiqa, M. P. Uddin, A. K. Mandal and
M. D. Hossain, “An Efficient Filtering Based Approach
Improving LSB Image Steganography using StatusBit
along with AES Cryptography”, IEEE International
Conference on Informatics, Electronics & Vision
(ICIEV), May 2014, pp. 1-6.
[9] Bandyopadhyay, S. K., 2010. An AlternativeApproach
of Steganography Using Reference Image.
International Journal of AdvancementsinTechnology
[10] S. Krishnagopal, S. Pratap, and B. Prakash, “Image
Encryption and Steganography Using Chaotic Maps
with a Double Key Protection”, 4th International
Conference on Soft Computing for Problem Solving,
Advances in Intelligent Systems and Computing, Dec.
2014, pp. 67-78.

More Related Content

What's hot

Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographyMaizatul Auni Bt Mazhar
 
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 

What's hot (19)

Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
F1803023843
F1803023843F1803023843
F1803023843
 
19_2
19_219_2
19_2
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
C01111519
C01111519C01111519
C01111519
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 

Similar to Secure Message Transmission using Image Steganography on Desktop Based

Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...IRJET Journal
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video SteganographyIRJET Journal
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systemsrinzindorjej
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkStephen Hasford
 

Similar to Secure Message Transmission using Image Steganography on Desktop Based (19)

Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
1.doc
1.doc1.doc
1.doc
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systems
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 

Secure Message Transmission using Image Steganography on Desktop Based

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD38067 | Volume – 5 | Issue – 1 | November-December 2020 Page 864 Secure Message Transmission using Image Steganography on Desktop Based Sidharth Sai S1, N. Priya2 1PG Student, 2Assistant Professor, 1,2Department of MCA, Jain Deemed-to-be-University, Bangalore, Karnataka, India ABSTRACT The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc… whichledwayforthe intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. KEYWORD: Cryptography, Steganography, Stegano tool How to cite this paper: Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1, December 2020, pp.864-866, URL: www.ijtsrd.com/papers/ijtsrd38067.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION As the current generation is getting developed, internet has become one of the most essential thing that every human needs now and then. With the invention of internet, life became more comfortable and ease. In today’s generation, the technologies have reached to a great extent where internet is being used as a primary medium by each and every individuals to transfer data’s, medias and information from one point to another across the biosphere. There are many transmission methods to transfer information using the internet via emails, facebook, whatsapp, etc which focuses on point to point transmission making the work to complete really fast and accurate. But one of the main and major problems what we are facing during data transmissions and communications over internet is security threat. During these data transmissions, our sensitive information’s gets intruded by third party in many ways. Therefore, it becomes a significant factor in safeguarding our medias during the transmission. Taking this data security into consideration, as data security prevents unauthorized users/hackers from accessing one’s files, many security techniques has beendevelopedinrecent times which includes cryptography, steganography and digital watermarking. Steganography is a practice of hiding text message into an image file, audio file or video files for safe point to point data transmissions. People often gets confused between steganography and cryptography. Both techniques are implemented to provide security for data transmissionsbutcryptographyisa method which uses encryption and decryption phase in form of cipher text blocks. This cipher text generation gets differed depending on the algorithms we use such as AES, RSA, etc…. Whereas the Steganography techniques hides a text inside many media formats which ll be seen as a normal image, audio or video when a data transmission is done. So, if a person views the article, then he/she has no idea that there is a hidden text inside, therefore he/she won’t indulge to decrypt the evidences. Existing system For transmission of data from one point to another, many of us use cryptographic technique. This techniquecanbeeasily recognized and intruded by the middle men. Though crypto techniques provide security for data transmission, it can be easily gathered and our information gets leaked. It doesn’t provide much security to the user until and unless a deep and more prominent algorithm is used. So to overcomefrom such existences, this STEGANOGRAPHY technique can be used. Problem statement When it comes to data transmission, there arises a question “How to do secure transmission”. In order to overcome this issue, steganography techniques comes into action which IJTSRD38067
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD38067 | Volume – 5 | Issue – 1 | November-December 2020 Page 865 hides our data inside several carrierssuchasimage,audioor video files which becomes difficult for the the intruders to gain authorization. Proposed system The main aim of the paper is to introduce a technique to overcome unauthorized data access during point to point transmissions over the internet. This is achieved through Steganography technique which hides the text message inside an image. This modified image looks similar to the original image with no changes in its pixel quality and its size. The encrypted image shared via social medias or other formats shouldn’t be noted that there is a hidden message embeded in it. By doing so, the act of stealing information can be reduced since the middle men doesn’t recognize that there is a message hidden inside the image when he/she tries to intrude into it. Past systems included lower embedding capacity and also quality of the image was very poor.So,thisalgorithmcreated a path for better image quality and embedding capacity. When it comes to atmostsecurity,bothdata hidingalgorithm and the image on which data is embedded should also be equally secured. Therefore, the security system is implemented in two layers, i.e the message that is to be hidden inside an image isencryptedusingAESalgorithmand this encrypted data is then hidden in the image. Again the image with hidden data is encrypted. Therefore, the person with the decryption key will have the full authorization to retrieve the secret message in its original form. AES algorithm The Advanced Encryption Standard is a symmetric cipher text block algorithm which is used to encrypt and decrypt the information for security purposes.Itisconsideredasone of the safest mode, hence it is used in worldwidestandard.It is also known as Rijndael algorithm whosefunctionistotake plain text in 128bit format and converts them into cipher blocks using keys of 128,192 and 256bits. Methodology The proposed topic includes two modules: Encrypt Decrypt Where the user has to first open and run the application. Then the user has to select the image file in which he has to hide the text and transfer to the other end. Then he has to type the key format which is used to carry out the algorthim. Later the text message which he has to send it to the other end has to be typed in the required column Once done, he/she will be given with two tabs – encrypt and decrypt. In ENCRYPT options, the text message which he/she wants to transfer it to the other end will be embedded inside an image. In DECRYPT mode, the other end user once he receives the encrypted image, he/she can decrypt the text image, save it to the required path and can view the hidden message. BLOCK DIAGRAM OF STEGANOGRAPHY Conclusion This system provides at most security since the intruder doesn’t know that there is a message hidden inside the image. Thus making him only torecovertheimagemaybe by using his practical familiarity. In the generation of in advance information swapping by means of internet and World Wide Web, steganography has developed lifeblood tool for information security. Steganography can be ranked based on many ethics and one among them is positioned on the type of cover media. REFERENCES [1] Kolakalur, Anush, Ioannis Kagalidis, and Branislav Vuksanovic. "Wavelet Based Color Video Steganography." International Journal ofEngineering and Technology 2016. [2] S. Song, J. Zhang, X. Liao, J. Du, and Q. Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Advanced in Control Engineering and Information Science, Dec. 2011, pp. 2767-2772. [3] Mstafa, Ramadhan J., and Khaled M. Elleithy. "A novel video steganographyalgorithminthe waveletdomain based on the KLT tracking algorithm and BCH codes." Systems, Applications and Technology Conference (LISAT), 2015. [4] Vidhya, P. M., and Varghese Paul. "A Method for Text Steganography Using Malayalam Text." Procedia Computer Science 46 , pp 524-531, 2015.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD38067 | Volume – 5 | Issue – 1 | November-December 2020 Page 866 [5] Mstafa, Ramadhan J., and Khaled M. Elleithy. "An Efficient Video Steganography Algorithm Based on BCH Codes." 2015. [6] Satpute, Snehal, et al. "An Approach towards Video Steganography Using FZDH (Forbidden Zone Data Hiding)." 2015. [7] Jenifer, K. Steffy, G. Yogaraj, and K. Rajalakshmi. "LSB Approachfor VideoSteganographytoEmbedImages." International Journal of Computer Science and Information Technologies 2014. [8] M. R. Islam, A. Siddiqa, M. P. Uddin, A. K. Mandal and M. D. Hossain, “An Efficient Filtering Based Approach Improving LSB Image Steganography using StatusBit along with AES Cryptography”, IEEE International Conference on Informatics, Electronics & Vision (ICIEV), May 2014, pp. 1-6. [9] Bandyopadhyay, S. K., 2010. An AlternativeApproach of Steganography Using Reference Image. International Journal of AdvancementsinTechnology [10] S. Krishnagopal, S. Pratap, and B. Prakash, “Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection”, 4th International Conference on Soft Computing for Problem Solving, Advances in Intelligent Systems and Computing, Dec. 2014, pp. 67-78.