LSB STEGANOGRAPHY AND AES CRYPTOGRAPHY BASED DATA HIDING USING IMAGE

For further details about project visit http://www.digitronsolutions.in/project-view/5f0981b1e37b9c2de44a8bb6 In the current digital world where all data is...

DigitronNetwrkSolutions•1.0K views•6:35

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

For further details about project visit http://www.digitronsolutions.in/project-view/5f0981b1e37b9c2de44a8bb6 In the current digital world where all data is stored as digital data security of data is a very big challenge in any communication. One of the reasons that intruders/hackers will be successful is that most of the information they get access to from a system is in a way that they can read it and can easily comprehend. Even if the data is encrypted, intruder’s will easily get the encrypted data and may use mechanism like brute force method and try to decrypt it and might even get success in decrypting it and may even reveal the information to others anonymous users, or modify the data so that it misrepresent an individual or organization, or might use the obtained data to launch an attack. So there is a need of a method to hide sensitive messages during transmission. Communication of data among the parties while maintain the confidentiality of it is a major issue everywhere, so to increase security of shared data a non-conventional approach Crystography is proposed. Crystography is a form of security technique in which 2 major techniques cryptography and steganography are combined together. In Crystography, cryptography is used for scrambling of data whereas steganography is used for hiding the scrambled data in carrier file of some type like image providing 2 level of security. This project intends to work on AES symmetric cryptography and image steganography, its uses and techniques. METHODOLOGY The proposed project model studies the applicability of steganography and cryptography algorithms for secure communication of data in any network. The project mainly consists of 3 major modules. 1. Perform AES (Advance Encryption Standard) Cryptography on data to be transmitted. In this module, plain data .i.e (a) and secret key (b) (as explained above) will be taken as input and AES Symmetric key encryption will be performed on the plain data generating a cipertext (encrypted text) which will be provided as input in next module. 2. LSB based Image steganography Processing. In this module, we take input as cover image i.e (c), the stego key (d) (as explained above) and the cipertext generated in previous module and apply LSB based steganography method that embeds secret data(cipertext) into cover image, thus generating a stego image as output which can be transmitted to the destination party either by email or any other medium. 3. Perform Reverse Decoding . Here The Destination party or receiver will receive the stego image perform first steganography decoding using the same stego key (d) to get encrypted data from image and will then apply AES decryption along with the secret key (b) as input for reverse decoding to get the original plain text message sent by the sender.

Video Information

Views
1.0K

Total views since publication

Likes
14

User likes and reactions

Duration
6:35

Video length

Published
Jul 11, 2020

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.