Loading

Steg Crypt (Encryption using Steganography)
Naveen Chandra Gowda1, P. Sai Venkata Srivastav2, Guru Prashanth. R3, Raunak. A4, Madhu Priya R5
1Naveen Chandra Gowda, Assistant Professor, Department of C&IT, REVA University, Bengaluru (Karnataka), India.
2P Sai Venkat, Department of C&IT, REVA University, Bengaluru (Karnataka), India.
3Madhu Priya R, Department of C&IT, REVA University, Bengaluru (Karnataka), India.
4Guru Prashanth, Department of C&IT, REVA University, Bengaluru (Karnataka), India.
5Raunak Acharjee, Department of C&IT, REVA University, Bengaluru (Karnataka), India.
Manuscript received on 05 June 2019 | Revised Manuscript received on 14 June 2019 | Manuscript Published on 29 June 2019 | PP: 224-229 | Volume-8 Issue-5S, May 2019 | Retrieval Number: E10460585S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The target of this venture is to obtain secured encryption and authentication using steganography. So as to accomplish this, numerous organizations & universities in the world have given solutions to secured communication, in the interim many algorithms have been created, including like AES, RSA, LSB etc. But though these algorithms have been developed they were endured to breakdown by hackers which make them obsolete. In this paper we try to combine many already existing algorithms like AES, LSB into one proposed system. Firstly, the utilization of steganography along with traditional encryption is implemented in the proposed system. Second, we try to achieve authentication of user using OTP via E-mail. Thirdly, the encrypted data is divided and sent across many servers so it’s impossible to get complete encrypted data in one path. By applying the proposed model, the probability of data compromise becomes very minimal and very hard to hack.
Keywords: RSA, AES, LSB, OTP.
Scope of the Article: Encryption Methods and Tools