Loading...

 

What is it about?

This research introduces a comprehensive framework that integrates encryption and steganography techniques for secure communication using digital photographs. Encryption obscures the content, while steganography hides encrypted data within selected image pixels, imperceptible to human observers. A pseudorandom number generator aids secure pixel selection. Retrieving the concealed message involves steganography's data extraction followed by decryption using the appropriate key. This approach safeguards sensitive data in various applications, ensuring the confidentiality and authenticity of digital communication.

Featured Image

Why is it important?

By combining encryption and steganography, the framework provides a multi-layered approach to secure communication. Encryption ensures that the content is obscured, making it difficult for unauthorized parties to decipher the information. Steganography adds an additional layer of security by hiding encrypted data within image pixels, thereby concealing the existence of the communication itself.

Perspectives

BMSorry, your browser does not support inline SVG.

The integration of encryption and steganography techniques signifies a comprehensive approach towards securing digital communication. Encryption ensures that the content of the message is obscured, making it unreadable to unauthorized users. Steganography further enhances security by hiding encrypted data within image pixels, making it imperceptible to human observers. This covert communication method adds an extra layer of security. The use of a pseudorandom number generator aids in securely selecting pixels for data embedding, making it more challenging for attackers to detect and extract hidden information.

Balajee Maram
SR University

Read the Original

This page is a summary of: A Framework for Encryption and Decryption Using Image Steganography, November 2023, Institute of Electrical & Electronics Engineers (IEEE),
DOI: 10.1109/icrais59684.2023.10367129.
You can read the full text:

Read

Contributors

The following have contributed to this page