Cryptosystem for Secure Data Transmission using Advance Encryption Standard (AES) and Steganography
DOI:
https://doi.org/10.32628/CSEIT195659Keywords:
Stego, Steganography, Cryptography, Least Significant Bit (LSB), Encryption, Advanced Encryption Standard (AES)Abstract
Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder
References
- Slain T., Deon S. (2004). Symmetric Key Encryption using Rijndael and C#.
- Narendra K Pareek (2012). Design and analysis of a novel digital Image encryption) scheme. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2.
- Ria Das, Indrajit Das (2016). Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques. IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
- Ankit Gambhir and Sibaram Khara (2016). Integrating RSA Cryptography & Audio Steganography. IEEE ICCCA.
- Moresh Mukhedkar, Prajkta Powar and Peter Gaikwad (2015.). Secure non real time image encryption algorithm development using cryptography & Steganography. IEEE INDICON.
- Irfan Pratama (2016). Increasing the Security of MP3 Steganography Using AES Encryption and MD5 Hash Function”. International Conference on Science and Technology-Computer. (ICST), IEEE.
- Nikhil Patel, ShwetaMeena (2016). LSB Based Image Steganography Using Dynamic Key Cryptography. International Conference on Emerging Trends in Communication Technologies (ETCT).
- S. H. Gawanda and P. Y. Pawar, (2012). M-Commerce Security Using random LSB Steganography and Cryptography.” International Journal od Machine Learning and Computing, vol. 2(4).
- Amogh Mahapatra, Rajballav Dash (2007), Data encryption and decryption by using hill cipher technique and self-repetitive matrix”, International Conference on Intelligent Computing, Computer Science & Information Systems.
- Himanshi Sharma, Kamal Kumar Sharma and Sharad Chauhan (2015). Steganography Techniques Using Cryptography-A Review”, Paper. International Journal of Recent Research Aspects, Special Issue: Engineering Research Aspects ISSN: 2349-7688.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.