International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
E-ISSN: 2349-7300Impact Factor - 9.907

A Widely Indexed Open Access Peer Reviewed Online Scholarly International Journal

Call for Paper Volume 12 Issue 4 July-August 2024 Submit your research for publication

Secure Data Transmission via Multi Image Steganography using Generative Adversarial Network

Authors: Shreya Sanjay Akole, Leena Sanjay Gholap, Angel Benny Thomas, Mrs. J. P. Kakad

Country: India

Full-text Research PDF File:   View   |   Download


Abstract: The proposed system is an innovative approach to multi-image steganography, a technique for concealing information within multiple images to enhance data security. In this system, the process begins by determining the length of the secret message to be hidden. Subsequently, the message is split into two distinct segments, each of which is encrypted using different cryptographic methods, thereby enhancing the security of the hidden content. Once encryption is complete, two unique hash codes are generated for these encrypted segments .To embed this encrypted information within images, users are provided with the flexibility to select two images of their choice. The system then seamlessly integrates the two hash codes into these chosen images. This ingenious approach ensures that the decryption process requires both selected images, providing an additional layer of security. To retrieve the concealed message, users must employ both images in the decryption process, making it a robust and secure method for multi-image steganography, effectively safeguarding sensitive information.

Keywords: LSB, Authentication, Security, Steganography


Paper Id: 230669

Published On: 2024-05-28

Published In: Volume 12, Issue 3, May-June 2024

Cite This: Secure Data Transmission via Multi Image Steganography using Generative Adversarial Network - Shreya Sanjay Akole, Leena Sanjay Gholap, Angel Benny Thomas, Mrs. J. P. Kakad - IJIRMPS Volume 12, Issue 3, May-June 2024.

Share this