Please use this identifier to cite or link to this item:
Title: Image Steganography Technique using trength of DES
Researcher: Mr. Manoj Kumar Ramaiya
Guide(s): Dr. Dinesh Goyal / Dr. Naveen Hemrajani
University: Suresh Gyan Vihar University
Completed Date: 2018
Abstract: newline The security of data over insecure communication channel has always been a prime issue in the mind of researchers. With the rapidly increasing use of the internet in all personnel and business purposes, the concern for the illegal access by an intruder and later misuse, has further put strain on the industry for developing means and techniques to overcome this. Cryptography, Steganography and digital watermarking have been used for a long time for data security. These are quite similar techniques but each achieves only partial goal of security and authenticity. newlineCryptography involves transforming a secrete data into unintelligible signal such that it is beyond intelligence. This unintelligible or ciphertext might produce suspicious in the mind of recipient and is a major shortcoming of Cryptography. newlineOn the other hand, Steganography embed secrete message in to a cover media and thus hides its existence. As a normal practise, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. In the image steganography, the secrete message is embedded into large size image, called the cover. The process generates the stego image. newlineBoth techniques provides the sufficient degree of security but are vulnerable to intruders attacks when used over unsecure communication channel. Attempt to combines the two techniques did results in security improvement but still with no authentication. The conventional steganographic techniques are based on LSB manipulation either in spatial domain or in transform domain because of its efficient hiding capacity and simplicity of implementation. The existing steganographic algorithms primarily focus on embedding strategy with less consideration to pre-processing of data which offer flexibility, robustness and high degree of security. newlineAbstract newlineix newlineThe goal of proposed work is to develop highly secured hybrid system employing the combined techniques of cryptography and steganography. To further
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
acknoweldgement.pdfAttached File254.47 kBAdobe PDFView/Open
appendix-a.pdf271.37 kBAdobe PDFView/Open
candidates declaration.pdf463.76 kBAdobe PDFView/Open
chapter 1.pdf517.14 kBAdobe PDFView/Open
chapter 2.pdf1.45 MBAdobe PDFView/Open
chapter 3.pdf1.45 MBAdobe PDFView/Open
chapter 4.pdf3.06 MBAdobe PDFView/Open
chapter 5.pdf147.56 kBAdobe PDFView/Open
list of abbreviation.pdf175.91 kBAdobe PDFView/Open
list of figures.pdf268.27 kBAdobe PDFView/Open
list of tables.pdf253.67 kBAdobe PDFView/Open
supervisor certificate.pdf325.27 kBAdobe PDFView/Open
table of contents.pdf381.12 kBAdobe PDFView/Open
thesis approval.pdf227.96 kBAdobe PDFView/Open
thesis cover.pdf19.57 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.