{"title":"基于AES和LSB的隐写技术","authors":"Lalit Negi, Lokesh Negi","doi":"10.1109/ICCED53389.2021.9664834","DOIUrl":null,"url":null,"abstract":"Nowadays mobile phone becoming one of the most popular communication system. Information shared through this medium is a very sensitive to the users. Hence it is highly needed to secure the message from the intruders. This paper proposed an android based secured system named Steg! developed by combining the cryptography and steganography. Here the algorithm used for cryptography is Advanced Encryption Standard (AES) and Least Significant Bit is used for the steganography. This hybrid approach increases the level of secretion of information from unauthorized the access by encrypting the message and hiding into the image. The application helps the user to hide/unhide the text to/from the image. The proposed system above is proven to be powerful and robust than those system which implements cryptography and steganography alone.","PeriodicalId":6800,"journal":{"name":"2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED)","volume":"29 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Image Steganography Using Steg with AES and LSB\",\"authors\":\"Lalit Negi, Lokesh Negi\",\"doi\":\"10.1109/ICCED53389.2021.9664834\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays mobile phone becoming one of the most popular communication system. Information shared through this medium is a very sensitive to the users. Hence it is highly needed to secure the message from the intruders. This paper proposed an android based secured system named Steg! developed by combining the cryptography and steganography. Here the algorithm used for cryptography is Advanced Encryption Standard (AES) and Least Significant Bit is used for the steganography. This hybrid approach increases the level of secretion of information from unauthorized the access by encrypting the message and hiding into the image. The application helps the user to hide/unhide the text to/from the image. The proposed system above is proven to be powerful and robust than those system which implements cryptography and steganography alone.\",\"PeriodicalId\":6800,\"journal\":{\"name\":\"2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED)\",\"volume\":\"29 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCED53389.2021.9664834\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCED53389.2021.9664834","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays mobile phone becoming one of the most popular communication system. Information shared through this medium is a very sensitive to the users. Hence it is highly needed to secure the message from the intruders. This paper proposed an android based secured system named Steg! developed by combining the cryptography and steganography. Here the algorithm used for cryptography is Advanced Encryption Standard (AES) and Least Significant Bit is used for the steganography. This hybrid approach increases the level of secretion of information from unauthorized the access by encrypting the message and hiding into the image. The application helps the user to hide/unhide the text to/from the image. The proposed system above is proven to be powerful and robust than those system which implements cryptography and steganography alone.