Title: Steganographic approach to enhance the data security in public cloud

Authors: S. Prabu; Gopinath Ganapathy

Addresses: School of Computer Science, Engineering and Applications, Bharathidasan University, Tiruchirappalli, 620023, Tamil Nadu, India ' School of Computer Science, Engineering and Applications, Bharathidasan University, Tiruchirappalli, 620023, Tamil Nadu, India

Abstract: Steganography is the claim to fame of disguising how correspondence is happening, by hiding information in other information. As picture encryption is a quickly creating innovation in the field of picture preparing, it can be portrayed as the strategy for encoding messages and data especially to such an extent that it can be gotten to ensured elements as it were. The paper manages an overview which deals about delineation enigma, along with its applications as well as techniques. It moreover endeavours so that it can recognise the essentials of a respectable enigma figuring as well as swiftly considers the steganography procedures that are better suitable for specific applications. Information transmission crosswise over systems is a typical practice according to the advancement of internet and sight and sound advances that develops exponentially today. The paper displayed about the mystery sharing of message by concealing it in a picture utilising the most ordinarily utilised least significant bit (LSB) method. Here, steganography went for concealing the information imperceptibly inside any media (picture, sound and video) so it ought to be unnoticeable to the unintended individual and in this manner accomplishing secured applications.

Keywords: encryption; decryption; least significant bit; LSB; bitmap steganography; data security; cloud computing.

DOI: 10.1504/IJCAET.2020.109522

International Journal of Computer Aided Engineering and Technology, 2020 Vol.13 No.3, pp.388 - 408

Received: 15 Dec 2017
Accepted: 18 Apr 2018

Published online: 11 Sep 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article