z-logo
open-access-imgOpen Access
Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission
Author(s) -
Meera Tamboli
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.35572
Subject(s) - encryption , steganography , computer science , steganography tools , key (lock) , least significant bit , computer security , variety (cybernetics) , information hiding , on the fly encryption , data security , image (mathematics) , cryptography , transmission (telecommunications) , computer vision , artificial intelligence , telecommunications , operating system
Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here