scispace - formally typeset
Search or ask a question
Author

Sneh Rachna

Bio: Sneh Rachna is an academic researcher. The author has contributed to research in topics: Steganography & Least significant bit. The author has co-authored 1 publications.

Papers
More filters
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, an image steganography methodology is performed using MATLAB/Simulink and a brief analysis of various algorithms is done and a histogram is also plotted.
Abstract: With the advent of growing terrorism in the world and the availability of the internet, data integrity is being endangered. Hence ensuring the security of the messages is paramount. Steganography is used—the process of hiding information in image, video, etc. Steganography is not any novel technique, it had been used too earlier where they use to shave the head and embed the message on to it and then wait for the hair to grow in ancient Greece; it was also used in war times. The methodology carried out here is of least significant bit technique and random pixel technique. A brief analysis of various algorithms is done and a histogram is also plotted. The image steganography methodology is performed using MATLAB/Simulink. It is also vindicated as to where to hide the message in the image so that, it is barely noticed by any observer, keeping in view the quality, size, and resolution of the image.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article , the authors presented a new method to hide the data into an image using RSA cryptosystem, which can be considered as a hybrid of steganography techniques and the public-key cryptography system and it can be used effectively for this purpose.
Abstract: Combine steganography techniques and the public key cryptosystem is new line to protect the transferring information. This paper presents a new method to hide the data into an image using RSA cryptosystem. Proposed algorithm is clarified in detail through the overall scenario and through concrete examples. The experiments on the proposed algorithm demon strated that it is a simple and efficient technique with a high level of security for transferring information. Accordingly, this proposed algorithm can be considered as a hybrid of steganography techniques and the public key cryptosystem and it can be used effectively for this purpose.