Efficient image steganography using adaptive cryptographic algorithms

Mahadi Hasan, Mehnaz Tabassum, Md. Jakir Hossain

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

In the age of internet, protecting our information has turned into important role as protecting our wealth. The drill is to protect both physical and digital information from destruction or unauthorized access. Hackers want to damage or steal our information. Steganography and cryptography are techniques for hidden communication. In this research work, we follow three techniques to improve the security; first we create a digest of message of our original message and then use steganography. Here the encryption is done by using the AES (Advanced Encryption Standard) algorithm and it can restore the previously hidden data to create a stego image. At the beginning, Secure Hash Algorithm (SHA-512) is used for making message digest. Message digest is used to check the validity of the original message. Finally steganography cover the desired message which is intricate and more secure.

Original languageEnglish
Title of host publicationIntelligent computing
Subtitle of host publicationproceedings of the 2018 Computing Conference
EditorsKohei Arai, Supriya Kapoor, Rahul Bhatia
Place of PublicationSwitzerland
PublisherSpringer-VDI-Verlag GmbH & Co. KG
Pages558-568
Number of pages11
Volume1
ISBN (Electronic)9783030011741
ISBN (Print)9783030011734
DOIs
Publication statusPublished - 2019
Externally publishedYes
EventComputing Conference, 2018 - London, United Kingdom
Duration: 10 Jul 201812 Jul 2018

Publication series

NameAdvances in Intelligent Systems and Computing
PublisherSpringer
Volume858
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

ConferenceComputing Conference, 2018
Country/TerritoryUnited Kingdom
CityLondon
Period10/07/1812/07/18

Keywords

  • AES
  • Cryptography
  • LSB
  • Message digest
  • Steganography

Fingerprint

Dive into the research topics of 'Efficient image steganography using adaptive cryptographic algorithms'. Together they form a unique fingerprint.

Cite this