ISSN 0975-3583
 

Journal of Cardiovascular Disease Research



    Enhancing Data Security using Advanced Multiple Image Steganography for Robust Confidentiality Protection


    R. Priyanka, K. Shruthi, T. Nikhitha, Y. Anusha, G. Rohith
    JCDR. 2024: 1929-1936

    Abstract

    In today's digital era, safeguarding the confidentiality and integrity of sensitive data has become of utmost importance. Steganography, an ancient technique of concealing information within different forms of data, has been employed for countless years. Within the realm of digital technology, it fulfills a crucial function in ensuring secure communication and safeguarding sensitive information. Conventional steganography techniques typically revolve around concealing data within a solitary image. Although this method is efficient, it can still be detected, especially when subjected to advanced analysis, due to the potential presence of detectable traces in single-image steganography. The main task is to create a reliable system for multiple image steganography that can effectively conceal confidential files within a collection of images. This requires creating algorithms that efficiently distribute information across images while preserving invisibility and guaranteeing accurate extraction. Given the increasing prevalence of cyber threats and concerns about privacy, it is becoming increasingly important to employ sophisticated methods to safeguard sensitive files and prevent unauthorized access or interception. Multiple image steganography is a rapidly growing field that has the potential to enhance security by distributing information across multiple images. This makes it even more difficult for potential adversaries to detect or extract the hidden data. The project aims to improve file security by utilizing advanced techniques in multiple image steganography. Through the distribution of information across a collection of images, this research aims to create a system that can effectively hide confidential files in a secure manner. This approach utilizes algorithms that are specifically designed to prioritize imperceptibility and robustness against detection efforts. This technological breakthrough has the potential to greatly enhance the security of file transmission and storage, ensuring that valuable information remains protected from unauthorized access or interception

    Description

    » PDF

    Volume & Issue

    Volume 15 Issue 4

    Keywords