Secure data transmission using cryptography, image processing and steganography

No Thumbnail Available
Sogam, Rahul Kishor
Issue Date
MSc in Information Systems with Computing
Dublin Business School
Items in eSource are protected by copyright. Previously published items are made available in accordance with the copyright policy of the publisher/copyright holder.
In today’s digital era data plays a crucial role, users are passing the information from one end to another without ensuring the security of the data. It is paramount to ensure the confidentiality, integrity and security of the data while it is being transmitted over any of the platforms. Many platforms use various types of security algorithms like cryptography, steganography but it is found that is not enough to make the secure data transfer. Attackers are always two steps ahead and find one or another way to violate the data security. Hence this report presents a comprehensive approach that combine cryptography using AES algorithm with QR code generation and least significant bit Steganography to achieve a robust framework and enhanced data security. This enhanced data security methodology addresses the challenges of secure data transmission across digital platforms. The foundation of proposed methodology lies in the implementation of AES cryptography, which is widely recognized and utilized robust secure cryptography algorithm. AES is employed to transform plain text secret message into cipher text using encryption operation. This encryption ensures the confidentiality and protection from unauthorized access of data. The further implementation of Quick Response code enhances the secure data transmission and hiding data into an image format. This QR codes serve as bridge between digital and physical mediums and enables the sufficient data exchange while maintaining the encryption integrity. To add one more level of security with AES and QR, LSB steganography is also added. In this layer of security LSB uses least significant bit of cover image pixels data and subtly embed the encrypted data into it. This covert channel not only complements the encryption but also adds the level of obscurity. This makes challenging for unauthorized users to detect the presence of the information. Proposed methodology is evaluated through rigorous testing to assess its security, effectiveness and its efficiency in real world scenarios. The experimental results and demonstrate the successful integration of AES cryptography, QR code operations and LSB steganography. This research contributes to the advancement of secure data transmission techniques.