Author:
Agarwal Shivani,Srivastava Ayushi,Gangwar Bhawna,Prajapati Ambuj,Yadav Amisha
Abstract
Steganography is a long-standing method of information concealment. It may be applied in a variety of ways. For example, it can be used to create a message that conceals the existence of a secret message that everyone can read and understand if they find it. To remedy this issue, the message was written in a different coded language that was only understood by the sender and the receiver. The method of sending a message using a coded language is known as cryptography; the process of encoding the message is known as encryption; and the message itself is known as cipher text. One of the numerous unique algorithms used in cryptography is the Blowfish algorithm. The purpose of this study is to present an overview of image steganography, covering its techniques and applications. It also tries to figure out what constitutes a good steganographic algorithm. We are employing the Blowfish method in conjunction with image-based steganography, which conceals information inside images such that, even in the unlikely event that the message is discovered, only the intended receiver can decipher it, in order to strengthen the security of the original message being delivered.
Publisher
International Journal of Innovative Science and Research Technology
Reference37 articles.
1. Hussaini S. (2020). Blowfish Algorithm for Secure Message Encryption in Cyber Security.Cloud Computing Journal, 5(2), 21-34.
2. M. M. Msallam,(2020) "An approach to hide an audio file in an image using LSB technique, " Al- Furat Journal of Innovations in Electronics and Computer Engineering (FJIECE), vol. 1, no. 3, pp. 1–7.
3. A. A. Arab, M. J. B. Rostami, and B. Ghavami(2022), "An image encryption algorithm using the combination of chaotic maps, " Optik, vol. 261, 2022, pp. 1–8.
4. Nagamunthala, M. and Manjula, R. (2023) Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment. Journal of Computer and Communications, 11, 135-149
5. Christina L. and Joe Irudayaraj V. S. (2014). Enhancing Data Security Using the Blowfish Algorithm. International Journal of Information Security, 18(3), 47-62.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Soil and Crop Recommendation Using Machine Learning;International Journal of Innovative Science and Research Technology (IJISRT);2024-06-22