Information Security through Image Steganography
Vimanyu Chopra1, Devinder Priyadarshi2

1Vimanyu Chopra*, UG Scholar, DAV Institute of Engineering & Technology, Jalandhar, India.
2Devinder Priyadarshi, Faculty, DAV Institute of Engineering & Technology, Jalandhar, India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 6949-6956 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2121109119/2019©BEIESP | DOI: 10.35940/ijeat.A2121.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Information security is an arduous task these days especially due to advancement in technology. Sending or receiving confidential information in an undetected form has been a major challenge. Steganography is the art or process of concealing information inside a text, audio or image file. The process of embedding information inside an image is known as Image steganography. The objective unlike cryptography is not to make the information difficult to understand but to hide it in plain sight. The concealed information is harder to detect and is only detected only by the receiver who is aware of its existence. Image Steganography is used to secure private files and documents, hide passwords and encryption keys as well as to transport highly confidential documents between international governments and organizations without revealing the existence of the hidden message. This also makes it essential in military and banking field for secure communication of information. This provides better security to the information being shared. This paper discusses history, techniques, applications, benefits and shortcomings of Image steganography. Further a discussion on the challenges and the future direction and trends of image steganography are also presented.
Keywords: Information security, Stegnanalysis, Image Steganography.