Applied Salt Technique to Secure Steganographic Algorithm
Edinburgh Napier University, School of Computing, Edinburgh, EH10 5DT, UK
* Author to whom correspondence should be addressed.
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Keywords: Steganography & Cryptography, Secure communication media, Salt Encryption, AES, Steganography with SHA-256
Received: 30 December 2022, Revised: 06 February 2023, Accepted: 07 February 2023, Published Online: 22 February 2023
APA Style
Oo, B. B. (2023). Applied Salt Technique to Secure Steganographic Algorithm. Journal of Engineering Research and Sciences, 2(2), 8–14. https://doi.org/10.55708/js0202002
Chicago/Turabian Style
Oo, Bo Bo. “Applied Salt Technique to Secure Steganographic Algorithm.” Journal of Engineering Research and Sciences 2, no. 2 (February 1, 2023): 8–14. https://doi.org/10.55708/js0202002.
IEEE Style
B. B. Oo, “Applied Salt Technique to Secure Steganographic Algorithm,” Journal of Engineering Research and Sciences, vol. 2, no. 2, pp. 8–14, Feb. 2023, doi: 10.55708/js0202002.
Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered one. The widespread use of digital data in practical applications has prompted the development of new and efficient methods for ensuring its security. Steganographic techniques can be used to, at least in part, achieve efficient secrecy. There have been suggested new and adaptable audio steganographic techniques. By using cryptography, readable language is converted to unintelligible data. In order to send and receive text, multimedia, or other important digital files safely, this paper discusses secure communication media. To have secure communication tools, the tools must lessen potential risks and weaknesses. Therefore, the primary factor to take into account for creating a solid communication system is transferred media. The objective of steganographic systems is to find a secure and reliable method to hide a significant amount of secret data. This research focuses on digital image audio steganography, which has become a popular method for data concealment.
- P. Rajkumar, R. Kar, A. K. Bhattacharjee, H. Dharmasa, “A Comparative Analysis of Steganographic Data Hiding within Digital Images,” International Journal of Computer Applications, vol. 53, no. 1, pp. 1–6, 2012, doi:10.5120/8382-1981.
- V. Lokeswara Reddy, Dr.A. Subramanyam, Dr.P. Chenna Reddy, “Stegnography Rajarao Kaviliga Related papers Implementation of LSB Steganography and its Evaluation for Various File Formats,” J. Advanced Networking and Applications, vol. 868, , pp. 868–872, 2011.
- M. Asad, J. Gilani, A. Khalid, “An enhanced least significant bit modification technique for audio steganography,” Proceedings – International Conference on Computer Networks and Information Technology, pp. 143–147, 2011, doi:10.1109/ICCNIT.2011.6020921.
- G. Kessler, “An Overview of Cryptography (Updated Version 24 January 2019),” Publications, 2019.
- D.S.Abdul. Elminaam, H.M.A. Kader, M.M. Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices,” Undefined, pp. 343–351, 2009, doi:10.7763/IJCTE.2009.V1.54.
- Rūta Rimkienė, What is AES Encryption and How Does It Work? | Cybernews, https://cybernews.com/resources/what-is-aes-encryption/, 2022.
- Y. JinaChanu, Kh. Manglem Singh, T. Tuithung, “Image Steganography and Steganalysis: A Survey,” International Journal of Computer Applications, vol. 52, no. 2, pp. 1–11, 2012, doi:10.5120/8171-1484.
- F. Djebbar, B. Ayad, K.A. Meraim, H. Hamam, “Comparative study of digital audio steganography techniques,” Eurasip Journal on Audio, Speech, and Music Processing, vol. 2012, no. 1, pp. 1–16, 2012, doi:10.1186/1687-4722-2012-25/FIGURES/12.