Stego-Based-Crypto Technique for High Security Applications

In this paper, a two stage (stego-based-crypto) invertible technique is proposed based on cryptography and steganography algorithms. In order to increase the security, the proposed paper uses RSA cryptographic algorithm in the first stage for encrypting the secret message, and Integer Wavelet Transform (IWT) based lifting scheme in the second stage as a steganography algorithm to hide the secret message, to increase the capacity of secret message payload and robustness, data are embedded in the integer wavelet transform coefficients; in the low, middle and high frequency sub-bands.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Computer Theory and Engineering (IJCTE)
Topic:
Security
Format:
PDF