Affiliation:
1. JSPM’S Rajarshi Shahu College Of Engineering, Tathawade, Pune, Maharashtra, India
Abstract
Information security plays an important role when considering data transmission. Transmission of sensitive data or communication through the internet turns out to be challenging due to security concerns. Generally, we use cryptography for information hiding and sending secret messages in the form of text. Nowadays, there are several techniques used for hiding information in any medium. One such technique is steganography. Building a secret communication system including Multi-image steganography will result in secure communication between the sender and the receiver without any interference from the hackers. Image steganography is the main aspect of information hiding where the ciphertext is embedded into an image called a cover image which is next to impossible for the intruders to see with their naked eyes. The hiding information can be any form of text, images, audio, and even videos inside a cover image. The conceptual definition of Multi-image Steganography is that the secret code is divided into multiple parts and is etched into multiple cover images. So we proposed two image steganography ideas to make it very challenging for the hackers to conceal the data. Thispaper proposes the Least significant bit(LSB) technique of Steganography and the Advanced Encryption Standard(AES) technique of Cryptography to build a safe and secure system. Here the sender and the receiver use the same key to encrypt and decrypt the data which is popularly termed a symmetric key.
Reference17 articles.
1. IJSTR VOL-8, ISSUE 12, DECEMBER 2019: Image Steganography Using LSB by Dr.Amarendra K, Venkata Naresh Mandhala, B.Chetangupta, G.GeethaSudheshna, V.Venkata Anusha.
2. A.J. Raphael and V. Sundaram, “Cryptography and Steganography-A Survey”, International Journal of Computer Technology and Applications, Vol. 2, No. 3, pp. 626-630, 2016
3. K. Curran and K. Bailey, “An Evaluation of Image Based Steganography Methods,” Multimedia Tools and Applications, Vol. 30 Issue 1, pp. 55 – 88, July 2006.
4. Image Steganography Using Steg with AES and LSB, - 2021 IEEE 7th International Conference on Computing Engineering and Design (ICCED)
5. T. Jamil, “The rijndael algorithm,” IEEE potentials, vol. 23, no. 2, pp. 36–38, 2004.