Data Transmission Using Steganography
Description
In this paper data bits are embedded randomly to achieve the highest securityby combiningsteganography& cryptography. To protect the contents of a messageCryptography is used &to protect both messages andcommunicating partiessteganography is used. To improve data capacity in an image2LSB technique is used.The study of invisible communication is called Steganography. In Steganography usually hide the existence of the communicated data in such a way that it remains confidential & it maintains secrecy between two communicating parties. How the parity of data can be used effectively to hide a secret message randomly in the image is explain in this paper. To hides the content of a private message from a unwanted people used Cryptography, whereas steganography even conceals the real message. Steganography & cryptography are commonly different concepts. The relation between them is related in many ways, the fundamental difference between them in the way they are defined and application of them for the different problems to which they are applied. Steganography & cryptography are different & where we transform the message so as to make it meaning obscure to unwanted people who intercept it. So, the definition of breaking the system is different.The structure of a message is jumbled in cryptography to make it meaningless and unintelligible unless the decryption key is detected.
Other
IJSRED - International Journal of Scientific Research and Engineering Development
Files
IJSRED-V6I5P34.pdf
Files
(286.1 kB)
Name | Size | Download all |
---|---|---|
md5:1f33060f3ecef497e0b2b58070eb1536
|
286.1 kB | Preview Download |
Additional details
Dates
- Issued
-
2023