Securing Information for Commercial File Sharing by Combining Raster Graphic and Vector Graphic Stseganographies
Rekha Kashyap1, Manasvini Ganesh2

1Rekha Kashyap, Professor and Head, Computer Science Department at Inderprastha Engineering College, Ghaziabad, India.
2Manasvini Ganesh, B. Tech in Computer Science Engineering from Inderprastha Engineering College, Sahibabad, affiliated with Dr. A.P.J. Abdul Kalam Technical University, Lucknow.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 788-795 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8005088619/2019©BEIESP | DOI: 10.35940/ijeat.F8005.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Commercial applications cannot declare use of steganography as its security model so as not to spoil the norm of “hidden” secret. Proposed paper suggests a model that can withhold security even after declaration of steganography’s presence allowing applicability in commercial scope. File to be secured is compressed and converted to byte stream and hidden in both raster graphic and vector graphic cover images and encapsulated in a PDF and shared. To extract the secured file from the cover images a key is required by the party intending to receive the secured file. This key is shared by Elliptic Curve Diffie Hellman Key Agreement Protocol. The intended receiver extracts the file by applying steganalysis. To implement this model an android application is developed that shares files by securing it in aforesaid fashion and transferring them via Wi-Fi Direct. Most of the digital image steganography researched are based on raster graphic cover images. The proposed model is designed so that limitations present in raster and vector steganographies each can be counterfeited to produce a secure solution that can be offered in digital image steganography. This solution is suggested as security model in commercial scope.
Keywords: Image Processing, Information Security, Steganography.