{"title":"Visual Steganography and Encryption Tachniques with Hardware Implementation","authors":"Hare Ram Sah, Hemang Shrivastava, M. Ramaiya","doi":"10.1109/ACIT50332.2020.9300055","DOIUrl":null,"url":null,"abstract":"The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 21st International Arab Conference on Information Technology (ACIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIT50332.2020.9300055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.