A Dual Approach to Image Security Using Steganography and Cryptography

Authors

  • Deepali Markam, Prof. Vikas Saxena

Keywords:

Image Security, Steganography, Cryptography, Data Protection, Hybrid Approach

Abstract

The increasing reliance on digital communication has intensified the need for robust techniques to secure sensitive data, particularly images that often carry personal, medical, financial, or classified information. Conventional cryptographic methods ensure confidentiality by transforming data into unreadable ciphertext, while steganography conceals information within innocuous cover media, preventing suspicion. However, when used independently, each technique has limitations—cryptography alone may attract attention due to its apparent randomness, and steganography alone may fail if the hidden data is discovered. This research explores a hybrid model that integrates cryptography and steganography to establish a twofold security mechanism for image protection. In the proposed approach, data is first encrypted using a secure cryptographic algorithm and then embedded into a cover image using steganographic techniques, ensuring both secrecy and invisibility. The system’s effectiveness is analyzed in terms of imperceptibility, robustness, and resistance to attacks, offering a comprehensive framework for secure image communication in modern networks.

References

Seth, D., Ramanathan, L., & Pandey, A. (2010). Security enhancement: combining cryptography and steganography. International Journal of Computer Applications, 9(11), 3-6.

Al-Barhmtoshy, H., Osman, E., & Ezzat, M. (2004). A novel security model combining cryptography and steganography. King Abdul-Aziz University, Computer Science Dept, 80203.

Song, S., Zhang, J., Liao, X., Du, J., & Wen, Q. (2011). A novel secure communication protocol combining steganography and cryptography. Procedia Engineering, 15, 2767-2772.

Phad Vitthal, S., Bhosale Rajkumar, S., & Panhalkar Archana, R. (2012). A novel security scheme for secret data using cryptography and steganography. IJ Computer Network and Information Security, 2, 36-42.

Bharti, P., & Soni, R. (2012). A new approach of data hiding in images using cryptography and steganography. International Journal of Computer Applications, 58(18), 1-5.

Rajyaguru, M. H. (2012). Crystography-combination of cryptography and steganography with rapidly changing keys. International Journal of Emerging Technology and Advanced Engineering, ISSN, 2250-2459.

Rao, B. R., Kumar, P. A., Rao, K. R. M., & Nagu, M. (2010). A novel information security scheme using cryptic steganography. Indian Journal of Computer Science and Engineering,

1(4), 327-332.

Prasanna, D. R. L., Anbarasi, L. J., & Vincent, M. J. (2011, February). A novel approach for secret data transfer using image steganography and visual cryptography. In Proceedings of the 2011 International Conference on Communication, Computing & Security (pp. 596-599).

Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187.

Narayana, S., & Prasad, G. (2010). Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal & Image Processing: An International Journal (SIPIJ) Vol, 1.

Downloads

How to Cite

Deepali Markam, Prof. Vikas Saxena. (2017). A Dual Approach to Image Security Using Steganography and Cryptography. International Journal of Engineering, Science and Humanities, 7(3), 01–08. Retrieved from https://www.ijesh.com/index.php/j/article/view/226

Similar Articles

<< < 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.