This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Mahima N , Noor Siddiqa, Tanvir Habib Sardar
—The Internet as a whole does not use secure links, thus information being transmitted may be vulnerable to interception as well. The importance of reducing the chances of information being detected during transmission is a major issue. A solution to be discussed is how passing of information can be done in a manner that the very existence of the message is unknown. This is important in order to repel attention from the potential attacker. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection of digital media. In this work, we focus on the achievement of a multi-layered security system by combining both cryptography and steganography. Encryption avoids passive attacks (reading) and by steganography, the message becomes undetectable. We make use of AES algorithm and Least Significant Bit (LSB) technique for hiding messages in an image. We have enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for an unauthorized person to extract the original message. The AES provides a good security as it takes considerably much more time to break by the brute force method for a given key length. The proposed methodology is proved good and produced expected output.
An Overview Of Crptography-9 November 2010,By Gary C Kessler
Improving Embedding Efficiency Of Covering Codes For Applications In Steganography By WeimingZhang,ShuozhongWang,AndXinpeng Zhan
 A detailed look at Steganographic Techniques and their use in an Open Systems Environment- By Bret Dunba.
.Implementation and Analysis of AES, DES and Triple DES on GSM Network, MajithiaSachin Lecturer, Department of Information Technology, Chandigarh Engineering College Landran (Mohali, PB), India, 2010
.AES Advanced Encryption Standard CSC 7002 Computer Security by William Roche, University of Colorado, Denver, May 2006
 NavitaAgarwal, Himanshu Sharma “An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography”, IJCSMC, vol. 2 issue 5, pp. 376-385, May 2013.
 Gary C.Kessler, “An Overview of Cryptography: Cryptographic”, HLAN, ver. 1, 1999-2014
Dept. of Cloud Technology and Information Security, School of Engineering and Technology, Jain University, Bengaluru Country Name, Mobile No: 9731683341, (e-mail: email@example.com)
No. of Downloads: 23 | No. of Views: 2176