Data Security using Variant of Hill Cipher

Srija Pulluri,Srijith Patha,Neha Madapati,Lokeshwari Vinya V,Satya Kumar C
DOI: https://doi.org/10.22214/ijraset.2023.49978
2023-04-30
International Journal for Research in Applied Science and Engineering Technology
Abstract:Abstract: Data is first collected, and the Pixel Repetition Technique is used to perform pre-processing, Payload capacity, attack protection, and visual quality. To rise the security of information concealing, The LSB information hiding algorithm of data using secret key has been presented to strengthen the security of information concealing. It increases human visual abilities, integrates information concealment and cryptography, and uses identity identification based on digital signature and encryption technology. It is based on a scheme where the receiver can retrieve secret data by applying the A* algorithm backwards. Last but not least, we tested safety and peak signal-to-noise ratio (PSNR). With stronger security and higher PSNR, the enhanced LSB data steganography technique using encryption technology is superior to the standard LSB data steganography method
What problem does this paper attempt to address?