Volume 20 No 10 (2022)
 Download PDF
A route planning for idyllic coverage in in sensor networks with Steganography
Dr.S.Padmapriya, Dr. M. Amanullah, Dr.S.Arun , Dr.R.Krishnamoorthy
Abstract
Steganography is a method used in covert communications to shield messages from prying eyes. The practice of writing discreetly or covertly is known as steganography. Electronic Steganography algorithm's cover media included text, pictures, and audio. It is challenging to employ steganography to safeguard private data, messages, or digital photographs in view of recent technology advancements. It is simple to determine whether a carrier file contains concealed information owing to web analytics. In this proposal, a steganographic method for two-way private communication is presented. The suggested approach combines cryptography and steganographic techniques. Using key-based (password-based) encryption methods, the created text is transformed into ciphertext and then placed into the text data. The ciphertext is converted into an image system throughout this phase. The approaches that make use of the least significant bit (LSB) of the data hiding scheme have been created to accomplish XOR and Elliptic Curve Cryptography (ECC) encryption. This enhances security accuracy in cutting-edge technologies and hinders unauthorized data access
Keywords
Steganography, Cryptography, Least Significant Bit(LSB), Encryption, Accuracy
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.