Loading

Data Masking using Cryptographic Techniques in Steganography
Karthikeyan B1, Narla Sai Teja2, Kolisetty Sarath Chandra3

1Dr.Karthikeyan B SAP, School of Computing, SASTRA Deemed University, Thanjavur, India.
2Narla Sai Teja Student, School of Computing, SASTRA Deemed University, Thanjavur, India.
3Kolisetty Sarath Chandra Student, School of Computing, SASTRA Deemed University, Thanjavur, India.
Manuscript received on 01 June 2019 | Revised Manuscript received on 07 June 2019 | Manuscript published on 30 June 2019 | PP: 2340-2346 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7391068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s world with the rapid development in technology we’ve entered the time where tremendous amounts of data are at constant risk and the security of data must be given utmost importance, we have cryptographic as well as steganographic techniques to achieve the same. In this paper, we have developed a method involving both these techniques to gain better results. Initially, the secret message to be transmitted is converted to ASCII values and is encrypted with the RSA asymmetric key cryptosystem and the obtained encrypted message which is in decimal format is converted to octal format and then to binary format by considering it as octal. Next, the binary bits attained are hidden inside any digital image by Least Significant Bits substitution to obtain the new image with secret message called as stego image is sent to the receiver, who performs inverse operations to obtain the secret message. Mean Squared Error and Peak Signal to Noise Ratio values between the original and stego images are computed and the results obtained by this method are found to be quite better than many other schemes.
Keywords: Cryptography, LSB, MSE, PSNR, RSA, Steganography.

Scope of the Article: Data Mining Methods, Techniques, and Tools