Friday 26th of April 2024
 

Transmitting Cryptographic data through Steganography


Maria Akhtar Mufti, Aihab Khan, Malik Sikandar Hayat Khiyal and Asim Munir

Computers are being used worldwide. The internet connects the world as one; giving rise to both the positive and the negative. Cyber-crime is a huge issue which can be resolved by some approaches. In this paper an approach is introduced to ensure the security of data. Steganography and cryptography are merged together in order to obtain a secure and reliable way of transmitting data. In this paper encrypted data is transmitted using steganography to thwart off attackers. Noise is introduced to the image at sender end and is reduced at receiving end. In this way a clear image is received instead of a corrupted image and the mere existence of the message is hidden from unauthorized third parties.

Keywords: Steganography, Cryptography, Frost Filter, Stego-image, Secret Key, Cover Medium, Plain text, Cipher text.

Download Full-Text


ABOUT THE AUTHORS

Maria Akhtar Mufti
Department of Software Engineering, Fatima Jinnah Women University, Rawalpindi, Pakistan

Aihab Khan
Department of Computer Science, Iqra University, Islamabad, Pakistan

Malik Sikandar Hayat Khiyal
Head of Academic (ES), Army Public College of Management and Sciences (APCOMS), Lalkurti, Rawalpindi, Pakistan

Asim Munir
Department of Computer Science, International Islamic University, Islamabad, Pakistan


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »