Stego-Based-Crypto Technique for High Security Applications

Download Now
Provided by: International Journal of Computer Theory and Engineering (IJCTE)
Topic: Security
Format: PDF
In this paper, a two stage (stego-based-crypto) invertible technique is proposed based on cryptography and steganography algorithms. In order to increase the security, the proposed paper uses RSA cryptographic algorithm in the first stage for encrypting the secret message, and Integer Wavelet Transform (IWT) based lifting scheme in the second stage as a steganography algorithm to hide the secret message, to increase the capacity of secret message payload and robustness, data are embedded in the integer wavelet transform coefficients; in the low, middle and high frequency sub-bands.
Download Now

Find By Topic