Image Based Steganographic & Cryptographic Process of Hiding Data

  • Unique Paper ID: 145376
  • PageNo: 364-367
  • Abstract:
  • In many organizations like FBI and RAWshare confidential and important data on any network. Hackers are always in wait for it. They hack the data and use it for their benefit. These peoples try to use these data to harm someone, they sale these important data to enemy countries. In either case, message sender or receiver has to pay the price. To protect from these undesirable acts, we can use Steganography and cryptography together to ensure security of the message. One of the most efficient and secure algorithms is RSA Algorithm for converting text message to cipher text. Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message and Cryptography is a mechanism to convert message or data in non readable form. In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original message is taken and is encrypted by RSA. The digital signature obtained is stored on an location. Digital signature is checked with the decryption side signature and its checked by comparing both signatures and autheticity can be proved by this method.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{145376,
        author = {Ramsagar Tripathi and Purbani Kar},
        title = {Image Based Steganographic & Cryptographic Process of Hiding Data},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {9},
        pages = {364-367},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=145376},
        abstract = {In many organizations like FBI and RAWshare confidential and important data on any network. Hackers are always in wait for it. They hack the data and use it for their benefit. These peoples try to use these data to harm someone, they sale these important data to enemy countries. In either case, message sender or receiver has to pay the price. To protect from these undesirable acts, we can use Steganography and cryptography together to ensure security of the message. One of the most efficient and secure algorithms is RSA Algorithm for converting text message to cipher text. Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message and Cryptography is a mechanism to convert message or data in non readable form. In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original message is taken and is encrypted by RSA. The digital signature obtained is stored on an location. Digital signature is checked with the decryption side signature and its checked by comparing both signatures and autheticity can be proved by this method.},
        keywords = {LSB Steganography,RSA,Digital Signature, Histogram.},
        month = {},
        }

Cite This Article

Tripathi, R., & Kar, P. (). Image Based Steganographic & Cryptographic Process of Hiding Data. International Journal of Innovative Research in Technology (IJIRT), 4(9), 364–367.

Related Articles