@article{E K_R_B_A_M_2022, title={Improved Security of Hidden Data Based on Steganography Using ECC Method}, volume={2}, url={https://shareit.joinjet.org/ojs/index.php/shareit/article/view/29}, DOI={10.53659/shareit.v2i2.29}, abstractNote={<p><span class="fontstyle0">C</span><span class="fontstyle0">ryptography and steganography are well-known characteristics in the realm of computer networks for best security purposes. The key concept is to send the data in a secure manner. As a result, providing an adequate level of security for data transfer is critical. It should also minimize the security algorithm’s time complexity. To encrypt the data and image, we used the "Elliptic Curve Cryptography" approach. To transfer the data securely, a "Least Significant Bit" steganography algorithm is employed insert encrypted data to be hidden inside the image. The image’s encrypted data is subsequently decoded using the decryption method. The decrypted data is then used to extract the hidden data. The image is then compressed before being sent over the internet. To simulate the outcomes, MATLAB is utilized indicating that it has the power of good embedding and protection.</span> </p>}, number={2}, journal={Scientific Hub of Applied Research in Engineering & Information Technology}, author={E K, ArulKarthick and R, Sanjai and B, Vignesh and A, Rajeshwaran and M, Navaneethan}, year={2022}, month={Apr.}, pages={5–11} }