@inproceedings{64d5aedf3b9245dfbf5ed70614cbe5c8,
title = "Efficient image steganography using adaptive cryptographic algorithms",
abstract = "In the age of internet, protecting our information has turned into important role as protecting our wealth. The drill is to protect both physical and digital information from destruction or unauthorized access. Hackers want to damage or steal our information. Steganography and cryptography are techniques for hidden communication. In this research work, we follow three techniques to improve the security; first we create a digest of message of our original message and then use steganography. Here the encryption is done by using the AES (Advanced Encryption Standard) algorithm and it can restore the previously hidden data to create a stego image. At the beginning, Secure Hash Algorithm (SHA-512) is used for making message digest. Message digest is used to check the validity of the original message. Finally steganography cover the desired message which is intricate and more secure.",
keywords = "AES, Cryptography, LSB, Message digest, Steganography",
author = "Mahadi Hasan and Mehnaz Tabassum and Hossain, {Md. Jakir}",
year = "2019",
doi = "10.1007/978-3-030-01174-1_42",
language = "English",
isbn = "9783030011734",
volume = "1",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer-VDI-Verlag GmbH & Co. KG",
pages = "558--568",
editor = "Kohei Arai and Supriya Kapoor and Rahul Bhatia",
booktitle = "Intelligent computing",
address = "Germany",
note = "Computing Conference, 2018 ; Conference date: 10-07-2018 Through 12-07-2018",
}