会议专题

Implementation and Analysis of Three Steganographic Approaches

Due to increasing the technologies security systems are very popular in many areas. The security of information can be achieved by using encryption and steganography. In cryptography, encrypted data is transmitted after transforming the other form instead of the original data. Contrast cryptography, information hiding process can be extended for protecting from the interesting of any attacker. This paper proposes the enhance security system by combining these two techniques. In this system, the encrypted message is embedded in a BMP image file. In proposed system, three LSB steganographic techniques have been implemented and analyzed. This proposed system intends for data confidentiality, data authentication and data integrity. This system not only enhances the security of data but also becomes more powerful mechanism. This system intends to support effective ways for protecting data. The primary goal of our system is to enhance the security of data and then to compare three steganographic techniques. Then we will use the optimized method for embedding. In this paper, we just present three steganographic approaches. In this system, data is encrypted with RC4 encryption algorithm and then embedded the encrypted text in the BMP image file using three steganogrpaphic methods.

encryption steganography LSB techniques RC4 algorithm

Wai Wai Zin Than Naing Soe

University of Computer Studies, Mandalay Mandalay, Myanmar

国际会议

2011 3rd IEEE International Conference on Computer Research and Development(ICCRD 2011)(2011第三届计算机研究与发展国际会议)

上海

英文

456-460

2011-03-11(万方平台首次上网日期,不代表论文的发表时间)