Archives

Efficient Steganography Process Of Hiding Text Contents In Bit Map Image Using LSB Based AES Algorithm


*Dr. T.Rama prabha, S.Anitha
Abstract

Information Security is a technique to protect the information from unknown access. Techniques like data hiding, secret key, dynamic key, OTP (One Time Password), Encryption, Decryption, QR Code, Finger Print, Sensor were used to maintain the security. It has been implemented in three ways. The ways are audio, video, image. The strength of cryptography depends on the algorithm and key used. The key can be private or public. Receiver distributes the public key to the intended senders and keep private key secret. Sender encrypts data with receiver’s public key and sends the cipher text to the receiver. The receiver decrypts that cipher text with own private key to generate plaintext. In private key cryptography, same key is used for both encryption and decryption. The receiver decrypts the cipher text with same key. In this proposed system an image is first encrypted with the Advanced Encryption Standard (AES) algorithm in output feedback (OFB) mode, after which the AES key is embedded into the encrypted image. Finally, AES perform 10, 12, or 14 rounds of computation on state array according to key size. In AddRoundKey step, the plaintext array that means state array is being implemented XOR with round key. In this step 16-byte state array XOR with 16 byte (4 words) round key used and it generates 16 byte output. ShiftRows step perform shifting of bytes among the columns of a state array. The state array contains 4 rows and 4 columns. It was concluded that AES algorithm consumes least encryption and RSA consume longest encryption time and observed that Decryption of AES algorithm is better than other algorithms. The proposed algorithm was implemented on many images.

Volume 11 | 02-Special Issue

Pages: 115-127