PDF    15

Keywords

ECC
Steganography
LSB
GUI
RSA
MATLAB
DES

Categories

How to Cite

E K, A., R, S., B, V., A, R., & M, N. (2022). Improved Security of Hidden Data Based on Steganography Using ECC Method. Scientific Hub of Applied Research in Engineering & Information Technology, 2(2), 5–11. https://doi.org/10.53659/shareit.v2i2.29

Abstract

Cryptography and steganography are well-known characteristics in the realm of computer networks for best security purposes. The key concept is to send the data in a secure manner. As a result, providing an adequate level of security for data transfer is critical. It should also minimize the security algorithm's time complexity. To encrypt the data and image, we used the "Elliptic Curve Cryptography" approach. To transfer the data securely, a "Least Significant Bit" steganography algorithm is employed insert encrypted data to be hidden inside the image. The image's encrypted data is subsequently decoded using the decryption method. The decrypted data is then used to extract the hidden data. The image is then compressed before being sent over the internet. To simulate the outcomes, MATLAB is utilized indicating that it has the power of good embedding and protection.

https://doi.org/10.53659/shareit.v2i2.29
  
   PDF    15
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2022 Scientific Hub of Applied Research in Engineering & Information Technology

Downloads

Download data is not yet available.

Citations