Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Public Key Steganography

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 8
Year of Publication: 2014
Authors:
Nesir Rasool Mahmood
Ali Abdul Azeez Mohammad
Zahraa Nesir Rasool
10.5120/17547-8143

Nesir Rasool Mahmood, Ali Abdul Azeez Mohammad and Zahraa Nesir Rasool. Article: Public Key Steganography. International Journal of Computer Applications 100(8):29-32, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Nesir Rasool Mahmood and Ali Abdul Azeez Mohammad and Zahraa Nesir Rasool},
	title = {Article: Public Key Steganography},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {8},
	pages = {29-32},
	month = {August},
	note = {Full text available}
}

Abstract

In this paper, a new method will be introduced for hiding information in images by using a public key method for ciphering the text before hiding information as well as this public key will be used in determining the position where the information will be hidden by using the last position in finding the new position, symmetric key also will be used in hiding process for deciding the number of bits that will be used from each pixel in the image, the combination of steganography and cryptography provide much strong method for keeping information secured and undiscovered from unwanted persons.

References

  • Michael Backes, and Christian Cachin " Public-Key Steganography with Active Attacks ", Switzerland, 2004.
  • F´abio Borges, Renato Portugal, and Jauvane Oliveira " Steganography with Public-Key Cryptography for Videoconference ", National Laboratory of Scientific Computing, 2007.
  • Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee and Poulami Das "A Tutorial Review on Steganography", University of Calcutta, 2008.
  • Shahana T "A Secure DCT Image Steganography based on Public-Key Cryptography ", India, 2013.
  • Ms. Priyanka P. Palsaniya, and Mr. Pravin D. Soni " CryptoSteganography:Security Enhancement by using Efficient Data Hiding Techniques", India, 2014.