Published October 27, 2023 | Version v1
Publication Open

Data Transmission Using Steganography

Description

In this paper data bits are embedded randomly to achieve the highest securityby combiningsteganography& cryptography. To protect the contents of a messageCryptography is used &to protect both messages andcommunicating partiessteganography is used. To improve data capacity in an image2LSB technique is used.The study of invisible communication is called Steganography. In Steganography usually hide the existence of the communicated data in such a way that it remains confidential & it maintains secrecy between two communicating parties. How the parity of data can be used effectively to hide a secret message randomly in the image is explain in this paper. To hides the content of a private message from a unwanted people used Cryptography, whereas steganography even conceals the real message. Steganography & cryptography are commonly different concepts. The relation between them is related in many ways, the fundamental difference between them in the way they are defined and application of them for the different problems to which they are applied. Steganography & cryptography are different & where we transform the message so as to make it meaning obscure to unwanted people who intercept it. So, the definition of breaking the system is different.The structure of a message is jumbled in cryptography to make it meaningless and unintelligible unless the decryption key is detected.

Other

IJSRED - International Journal of Scientific Research and Engineering Development

Files

IJSRED-V6I5P34.pdf

Files (286.1 kB)

Name Size Download all
md5:1f33060f3ecef497e0b2b58070eb1536
286.1 kB Preview Download

Additional details

Dates

Issued
2023