SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1343
Review On Encrypting and Decrypting Message Via Image
Slicing
Sudeshna Khedekar[1], Digvij Akre[2], Vishakha Mulik[3], Prof. Bhavna Arora [4]
[1], [2], [3] Student, Department of Computer Engineering, Atharva College of Engineering, Mumbai
[4] Professor, Department of Computer Engineering, Atharva College of Engineering, Mumbai
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Now days the multimedia data protection is
becoming very important it has become the topmost priority
to keep our data secure due to this it is necessary that the
data that is to be transmitted via message must be secured
from unauthenticated or third-party access so to secure the
data the public and the private sectors use various kinds of
techniques and methods to guard the valuable data from
unauthenticated access there are different techniques used
to keep your secret data safe.
Key Words: Steganography, Cryptography, Encryption,
Security, Decryption.
1. INTRODUCTION
In the current trends, the technologies have been
advanced. Most of the individuals prefer using the internet
as the primary medium to transfer data from one end to
another across the internet. There are many possible ways
to transmit data using the internet like: via e-mails,
sending text and images, etc. In the present
communication world, images are widely in use. As the
technology is increasing day by day there is a need to
secure the data that is being transmitted over unsecured
channel. The data security can be enhanced by
combination of Cryptography and steganography.
Basically, Data security means protection of data from
unauthorized users or attackers. Encryption is one of the
techniques for the information security.
Various technologies we applied in our day-to- day life and
huge data can be conveyed through the network through
one medium to other the valuable data that is transmitted
is not safe by third party users hence its very essential
thing to keep that valuable data secure from such
unauthenticated access in this digital world and current
necessity this requirement can be achieved by different
approaches like steganography and cryptography
techniques approach.
2. LITERATURE SURVEY
Image steganography using Modified Least
Significant Bit [1]
The above paper used LSB techniques on image the aim of
this study is to accomplish the protection by applying a
alter steganography method.
New Approaches to Encrypt and Decrypt Data in
Image using Cryptography and Steganography Algorithm
[2]
The above paper deal on working to secure information
using hybrid process like crypto and stego in their
approach there is a use of h-lsb along with affine cipher
algorithm that has been used for providing a lot of safety
to knowledge during a network surroundings
Advanced Encryption Standard (AES) Algorithm
to Encrypt and Decrypt Data [3]
In their paper they have used AES algorithm which gives
detail of many crucial features of it and also explain about
some earlier researches the algorithm has its own specific
structure to encode and decode secrete data and is given
in hardware and to code anywhere in the globe.
Image Security using Image Encryption and Image
Stitching [4]
Their paper aims to give safe images using a different
image technique that includes image encrypt technique
with image stitch technique in the paper it generates
sequence chaotic key that use in encoding of each image
where initial picture is transferred and also each part is
decoded and transferred to the other end.
A Review on Steganography Techniques [5]
In their paper most of the modern techniques that have
been in run on image steganography field and to analyzes
them to clarify the strong and lacking points in each work
individually in order to include in thought for future works
in time ahead.
A research Paper for Symmetric and asymmetric
cryptography [6]
The paper in which the author deal with providing
confidential data with credibility this paper provides us
about symmetric and asymmetric cryptography and also
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1344
the advantage of referring it and the way we tend to safe
the data by the third-party user access.
Image Steganography Using LSB [7]
In this paper the idea is to defined on a process of hiding
data to image by using the least significant bit LSB and the
symmetric key between the sender and the receiver user
here we have to settle on the bits that will get the
minimum resolution between the first image and stego
image this paper further explains how the encryption and
decryption processes are done
Steganography in Images Using LSB Technique [8]
This paper focuses to protect information that send
between two users this paper describes with concealing
text in an image file using least important bit lsb technique
the lsb algorithm is enforced in abstraction domain within
which the payload bits area unit embedded into the lsb of
cover image to derive the stego-image.
Information Security Based on Steganography &
Cryptography Techniques: A Review [9]
A lot of analysis has taken place in direction to reduce the
safety problems by contributory numerous approaches
however totally different terrains create separate
challenges during this context this paper presents the
investigation of 2 common security mechanisms
particularly cryptography and steganography.
Enhancing the Security and Quality of LSB based
Image Steganography [10]
In this paper we learned the process arbitrarily scatter the
bits of the message in the cover image and thus to making
it tough for third party user to get the access to the
original message the solution is to provide good
enhancement to lsb approach is consider to secure as well
as provide image quality.
3. DISCUSSION
Security is very essential in today's society. Confidential
data and information in today's society are not safely
transferred via the network. Many technologies are used to
secure data. New technologies are introduced to deliver
data securely to the user. safety can be achieved by
different techniques. We have tried to use hybrid
technology to deliver data safely to the user. Get data
securely by combining a lot of technology So hybrid
technology is used. In this we used cryptography,
steganography techniques that are already used
technology, but we added image slicing and image stitching
technology to get more secure data. This technology can be
used for future security and this technology can be
improved for better results.
4. BLOCK DIAGRAM
Fig 1. sender side
Fig 2 . receiver side
5. COMPARISION OF EXISTING SYSTEM
6. LIMITATIONS
 However, terrorist criminals also this can be really
much serious if this method is gone in the
incorrect hands like hackers.
 Large number of data huge file size so someone
can doubt about it.
7. FUTURE SCOPE
This idea and approach that we have implemented does
not end here. There can be a future scope for development
we can extend this particular project into multiple
platforms. Particularly, we can incorporate additional
algorithm together to make is more appealing. One other
scope of improvement in expanding the idea hiding the
data into a video format so that the application can be more
secure so that different sector can use this to secure the
way of communication between the user and themself.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1345
8. CONCLUSION
With the advance development of communicating
technologies and other network technologies the problem
of secure communication of data has taken additional
attention. In this paper we have proposed an approach of
encrypting a message for safer transmission to ensure the
safe transmission of data we have use multiple data
security technique i.e., hybrid techniques that includes
AES cryptography LSB steganography image slicing and
image stitching method so that to maintain authenticity
during data transmission and to avoid any data loss.
REFERENCES
[1] Ahmad M. Odat and Mohammed A. Otair. “Image
steganography using Modified Least Significant Bit”.
Indian Journal of Science and Technology, Vol 9(39),
DOI:10.17485 October 2016
[2] Ako Muhammad Abdullah and Roza Hikmat Hama
Aziz “New Approaches to Encrypt and Decrypt Data in
Image using Cryptography and Steganography
Algorithm”. International Journal of Computer
Applications (0975 – 8887) Volume 143 – No.4, June
2016.
[3] Ako Muhammad Abdullah, “Advanced Encryption
Standard (AES) Algorithm to Encrypt and Decrypt
Data”.
[4] Jyoti T.G.Kankonkar and Prof. Nitesh Naik,“Image
Security using Image Encryption and Image Stitching”,
Proceedings of the IEEE 2017 International
Conference on Computing Methodologies and
Communication.
[5] Wafaa Mustafa Abduallah and Abdul Monem S. Rahma,
“A Review on Steganography Techniques”, American
Scientific Research Journal for Engineering,
Technology, and Sciences (ASRJETS), ISSN (Print)
2313-4410, ISSN (Online) 2313-4402
[6] Akshay Kekunnaya, Rajeshwari Gundla, Siddharth
Nanda, “A research Paper for Symmetric and
asymmetric cryptography”, ijrece vol. 7 issue 2 (april-
june 2019), issn: 2393-9028 (print) | issn: 2348-2281
(online)
[7] Dr. Amarendra K, Venkata Naresh Mandhala, B.Chetan
gupta, G.Geetha Sudheshna, V.Venkata Anusha, “Image
Steganography Using LSB”, international journal of
scientific & technology research volume 8, issue 12,
December 2019, issn 2277-8616
[8] Arun Kumar Singh, Juhi Singh and Dr. Harsh Vikram
Singh, “Steganography in Images Using LSB
Technique”, International Journal of Latest Trends in
Engineering and Technology (IJLTET), ISSN: 2278-
621X
[9] P, Kumar and V, Sharma.” Information Security Based
on Steganography & Cryptography Techniques: A
Review”. International Journal of Advanced Research
in Computer Science and Software Engineering, Vol. 4,
Issue 10, October (2014):247-250.
[10] Nadeem Akhtar, Pragati Johri and Shahbaaz Khan,”
Enhancing the Security and Quality of LSB based
Image Steganography”, International Conference on
Computational Intelligence and Communication
Networks 2013 IEEE DOI 10.1109.
[11] M. Pavani1, S. Naganjaneyulu, C. Nagaraju,” A Survey
on LSB Based Steganography Methods” International
Journal of Engineering and Computer Science
ISSN:2319-7242 Volume 2 Issue 8 August, 2013 Page
No. 2464-2467.
[12] M.Pitchaiah, Philemon Daniel and Praveen,
“Implementation of Advanced Encryption Standard
Algorithm”, International Journal of Scientific &
Engineering Research Volume 3, Issue 3, March -2012,
ISSN 2229-5518.
[13] Rajaratnam Chandramouli and Nasir D. Memon,
“Analysis of LSB based image steganography
techniques”, 2001 International Conference on
Volume: 3, DOI: 10.1109/ICIP.2001.958299.
[14] Ramadhan J. Mstafa and Christian Bach, “Information
Hiding in Images Using Steganography Techniques”,
Northeast Conference of the American Society for
Engineering Education (ASEE)At: Norwich University
David Crawford School of Engineering,
DOI:10.13140/RG.2.1.1350.9360.
[15] Nikhil Patel and Shweta Meena, “LSB based image
steganography using dynamic key cryptography”,
2016 International Conference on Emerging Trends in
Communication Technologies (ETCT),
DOI:10.1109/ETCT.2016.7882955.

Weitere ähnliche Inhalte

Ähnlich wie Review On Encrypting and Decrypting Message Via Image Slicing

IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issuesIAEME Publication
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyIRJET Journal
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachIRJET Journal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographyMaizatul Auni Bt Mazhar
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 

Ähnlich wie Review On Encrypting and Decrypting Message Via Image Slicing (20)

IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
1.pdf
1.pdf1.pdf
1.pdf
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
19_2
19_219_2
19_2
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Kürzlich hochgeladen (20)

Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 

Review On Encrypting and Decrypting Message Via Image Slicing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1343 Review On Encrypting and Decrypting Message Via Image Slicing Sudeshna Khedekar[1], Digvij Akre[2], Vishakha Mulik[3], Prof. Bhavna Arora [4] [1], [2], [3] Student, Department of Computer Engineering, Atharva College of Engineering, Mumbai [4] Professor, Department of Computer Engineering, Atharva College of Engineering, Mumbai ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Now days the multimedia data protection is becoming very important it has become the topmost priority to keep our data secure due to this it is necessary that the data that is to be transmitted via message must be secured from unauthenticated or third-party access so to secure the data the public and the private sectors use various kinds of techniques and methods to guard the valuable data from unauthenticated access there are different techniques used to keep your secret data safe. Key Words: Steganography, Cryptography, Encryption, Security, Decryption. 1. INTRODUCTION In the current trends, the technologies have been advanced. Most of the individuals prefer using the internet as the primary medium to transfer data from one end to another across the internet. There are many possible ways to transmit data using the internet like: via e-mails, sending text and images, etc. In the present communication world, images are widely in use. As the technology is increasing day by day there is a need to secure the data that is being transmitted over unsecured channel. The data security can be enhanced by combination of Cryptography and steganography. Basically, Data security means protection of data from unauthorized users or attackers. Encryption is one of the techniques for the information security. Various technologies we applied in our day-to- day life and huge data can be conveyed through the network through one medium to other the valuable data that is transmitted is not safe by third party users hence its very essential thing to keep that valuable data secure from such unauthenticated access in this digital world and current necessity this requirement can be achieved by different approaches like steganography and cryptography techniques approach. 2. LITERATURE SURVEY Image steganography using Modified Least Significant Bit [1] The above paper used LSB techniques on image the aim of this study is to accomplish the protection by applying a alter steganography method. New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm [2] The above paper deal on working to secure information using hybrid process like crypto and stego in their approach there is a use of h-lsb along with affine cipher algorithm that has been used for providing a lot of safety to knowledge during a network surroundings Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data [3] In their paper they have used AES algorithm which gives detail of many crucial features of it and also explain about some earlier researches the algorithm has its own specific structure to encode and decode secrete data and is given in hardware and to code anywhere in the globe. Image Security using Image Encryption and Image Stitching [4] Their paper aims to give safe images using a different image technique that includes image encrypt technique with image stitch technique in the paper it generates sequence chaotic key that use in encoding of each image where initial picture is transferred and also each part is decoded and transferred to the other end. A Review on Steganography Techniques [5] In their paper most of the modern techniques that have been in run on image steganography field and to analyzes them to clarify the strong and lacking points in each work individually in order to include in thought for future works in time ahead. A research Paper for Symmetric and asymmetric cryptography [6] The paper in which the author deal with providing confidential data with credibility this paper provides us about symmetric and asymmetric cryptography and also
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1344 the advantage of referring it and the way we tend to safe the data by the third-party user access. Image Steganography Using LSB [7] In this paper the idea is to defined on a process of hiding data to image by using the least significant bit LSB and the symmetric key between the sender and the receiver user here we have to settle on the bits that will get the minimum resolution between the first image and stego image this paper further explains how the encryption and decryption processes are done Steganography in Images Using LSB Technique [8] This paper focuses to protect information that send between two users this paper describes with concealing text in an image file using least important bit lsb technique the lsb algorithm is enforced in abstraction domain within which the payload bits area unit embedded into the lsb of cover image to derive the stego-image. Information Security Based on Steganography & Cryptography Techniques: A Review [9] A lot of analysis has taken place in direction to reduce the safety problems by contributory numerous approaches however totally different terrains create separate challenges during this context this paper presents the investigation of 2 common security mechanisms particularly cryptography and steganography. Enhancing the Security and Quality of LSB based Image Steganography [10] In this paper we learned the process arbitrarily scatter the bits of the message in the cover image and thus to making it tough for third party user to get the access to the original message the solution is to provide good enhancement to lsb approach is consider to secure as well as provide image quality. 3. DISCUSSION Security is very essential in today's society. Confidential data and information in today's society are not safely transferred via the network. Many technologies are used to secure data. New technologies are introduced to deliver data securely to the user. safety can be achieved by different techniques. We have tried to use hybrid technology to deliver data safely to the user. Get data securely by combining a lot of technology So hybrid technology is used. In this we used cryptography, steganography techniques that are already used technology, but we added image slicing and image stitching technology to get more secure data. This technology can be used for future security and this technology can be improved for better results. 4. BLOCK DIAGRAM Fig 1. sender side Fig 2 . receiver side 5. COMPARISION OF EXISTING SYSTEM 6. LIMITATIONS  However, terrorist criminals also this can be really much serious if this method is gone in the incorrect hands like hackers.  Large number of data huge file size so someone can doubt about it. 7. FUTURE SCOPE This idea and approach that we have implemented does not end here. There can be a future scope for development we can extend this particular project into multiple platforms. Particularly, we can incorporate additional algorithm together to make is more appealing. One other scope of improvement in expanding the idea hiding the data into a video format so that the application can be more secure so that different sector can use this to secure the way of communication between the user and themself.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1345 8. CONCLUSION With the advance development of communicating technologies and other network technologies the problem of secure communication of data has taken additional attention. In this paper we have proposed an approach of encrypting a message for safer transmission to ensure the safe transmission of data we have use multiple data security technique i.e., hybrid techniques that includes AES cryptography LSB steganography image slicing and image stitching method so that to maintain authenticity during data transmission and to avoid any data loss. REFERENCES [1] Ahmad M. Odat and Mohammed A. Otair. “Image steganography using Modified Least Significant Bit”. Indian Journal of Science and Technology, Vol 9(39), DOI:10.17485 October 2016 [2] Ako Muhammad Abdullah and Roza Hikmat Hama Aziz “New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm”. International Journal of Computer Applications (0975 – 8887) Volume 143 – No.4, June 2016. [3] Ako Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data”. [4] Jyoti T.G.Kankonkar and Prof. Nitesh Naik,“Image Security using Image Encryption and Image Stitching”, Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication. [5] Wafaa Mustafa Abduallah and Abdul Monem S. Rahma, “A Review on Steganography Techniques”, American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), ISSN (Print) 2313-4410, ISSN (Online) 2313-4402 [6] Akshay Kekunnaya, Rajeshwari Gundla, Siddharth Nanda, “A research Paper for Symmetric and asymmetric cryptography”, ijrece vol. 7 issue 2 (april- june 2019), issn: 2393-9028 (print) | issn: 2348-2281 (online) [7] Dr. Amarendra K, Venkata Naresh Mandhala, B.Chetan gupta, G.Geetha Sudheshna, V.Venkata Anusha, “Image Steganography Using LSB”, international journal of scientific & technology research volume 8, issue 12, December 2019, issn 2277-8616 [8] Arun Kumar Singh, Juhi Singh and Dr. Harsh Vikram Singh, “Steganography in Images Using LSB Technique”, International Journal of Latest Trends in Engineering and Technology (IJLTET), ISSN: 2278- 621X [9] P, Kumar and V, Sharma.” Information Security Based on Steganography & Cryptography Techniques: A Review”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 10, October (2014):247-250. [10] Nadeem Akhtar, Pragati Johri and Shahbaaz Khan,” Enhancing the Security and Quality of LSB based Image Steganography”, International Conference on Computational Intelligence and Communication Networks 2013 IEEE DOI 10.1109. [11] M. Pavani1, S. Naganjaneyulu, C. Nagaraju,” A Survey on LSB Based Steganography Methods” International Journal of Engineering and Computer Science ISSN:2319-7242 Volume 2 Issue 8 August, 2013 Page No. 2464-2467. [12] M.Pitchaiah, Philemon Daniel and Praveen, “Implementation of Advanced Encryption Standard Algorithm”, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012, ISSN 2229-5518. [13] Rajaratnam Chandramouli and Nasir D. Memon, “Analysis of LSB based image steganography techniques”, 2001 International Conference on Volume: 3, DOI: 10.1109/ICIP.2001.958299. [14] Ramadhan J. Mstafa and Christian Bach, “Information Hiding in Images Using Steganography Techniques”, Northeast Conference of the American Society for Engineering Education (ASEE)At: Norwich University David Crawford School of Engineering, DOI:10.13140/RG.2.1.1350.9360. [15] Nikhil Patel and Shweta Meena, “LSB based image steganography using dynamic key cryptography”, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), DOI:10.1109/ETCT.2016.7882955.