Image Based Steganographic & Cryptographic Process of Hiding Data
Author(s):
Ramsagar Tripathi, Purbani Kar
Keywords:
LSB Steganography,RSA,Digital Signature, Histogram.
Abstract
In many organizations like FBI and RAWshare confidential and important data on any network. Hackers are always in wait for it. They hack the data and use it for their benefit. These peoples try to use these data to harm someone, they sale these important data to enemy countries. In either case, message sender or receiver has to pay the price. To protect from these undesirable acts, we can use Steganography and cryptography together to ensure security of the message. One of the most efficient and secure algorithms is RSA Algorithm for converting text message to cipher text. Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message and Cryptography is a mechanism to convert message or data in non readable form. In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original message is taken and is encrypted by RSA. The digital signature obtained is stored on an location. Digital signature is checked with the decryption side signature and its checked by comparing both signatures and autheticity can be proved by this method.
Article Details
Unique Paper ID: 145376

Publication Volume & Issue: Volume 4, Issue 9

Page(s): 364 - 367
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews