Secure Data Communication Using Steganography
- Version
- Download 16
- File Size 308.08 KB
- File Count 1
- Create Date 1 January 2026
- Last Updated 1 January 2026
Secure Data Communication Using Steganography
Shwetha K AssistantProfessor,
Department of Electronics and Communication Engineering, MaharajaInstituteofTechnology Mysore, Karnataka, India shwetha_ece@mitmysore.in
Bhandavya A R
Department of Electronics and Communication Engineering, MaharajaInstituteofTechnology Mysore, Karnataka, India bhandavya274@gmail.com
Ganavi
Department of Electronics and Communication Engineering, MaharajaInstituteofTechnology Mysore, Karnataka, India ganavigowda2518@gmail.com
Likhith K
Department of Electronics and Communication Engineering, Maharaja Institute of Technology Mysore, Karnataka, India likhithk140@gmail.com
Rithisha
Department of Electronics and Communication Engineering, Maharaja Institute of Technology Mysore, Karnataka, India rithisha17hamse@gmail.com
Abstract—In the present digital era, ensuring secure and confidential communication over open networks has become increasingly important due to rapid growth of cyber threats and data interception techniques.Traditional encryption methods protect the content of information but do not conceal the existence of the communication, which can attract unwanted attention.
This work presents the development of a secure data communication system utilizing steganography for embedding sensitive information into multimedia files, including images and text. The preposed methodology incorporates least significant bit (LSB) technique. Experimental results demonstrate that the system effectively embeds and retrieves hidden data with high accuracy, maintain imperceptibility and robustness under controlled conditions. The user interface was evaluated for usability, ensuring operational stability and effective feedback mechanisms.The study highlights that while the system achieves reliable concealment and secure transmission of data, challenges such as limited embedding capacity, vulnerability to steganalysis, and susceptibility to media manipulations remain.
Keywords—Steganography, Secure data Communication, Least Significant Bit, Multimedia data hiding,InformationSecurity, Steganalysis, Data Confidentiality
Download