Loading

Design a Secure Communication Technique using Concepts of Image Steganography and Cryptography
Shashwat Kumar Dev1, Kohinoor Jain2, Vyshakh Sreekumar3, Nikhil Bhardwaj4, Manikandan K.5

1Shashwat Kumar Dev*, Student, Department of Computer science and Engineering, Vellore Institute of Technology, Vellore, India.
2Kohinoor Jain Student, Department of Computer science and Engineering, Vellore Institute of Technology, Vellore, India.
3Vyshakh Sreekumar, Student, Department of Computer science and Engineering, Vellore Institute of Technology, Vellore, India.
4Nikhil Bhardwaj, Student, Department of Computer science and Engineering, Vellore Institute of Technology, Vellore, India.
5Prof. Manikandan K., Associate Professor, Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 21, 2020. | Manuscript published on March 10, 2020. | PP: 2299-2304 | Volume-9 Issue-5, March 2020. | Retrieval Number: E2786039520/2020©BEIESP | DOI: 10.35940/ijitee.E2786.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With increase in the data transmission and data exchange in daily life, along with the increasing data thefts and other adversary snooping, the security and privacy of data has become an important thing to be concerned about. Throughout the years many different approach, ideas, algorithms and protocols have been developed to protect the data from snoopers and adversaries and ensure secure communication. Every approach has its own pros and cons. This project is an attempt to combine two different approaches of data protection- (Steganography and Cryptography) to develop a powerful and secured method for data exchange. 
Keywords: Communication, Cryptography, security, steganography
Scope of the Article: Economics of Energy Harvesting Communications