Design and Implementation of Public Key Steganography
Arpan Ghorai1, Dibyendu Chowdhury2, Satyajit Das3

1Arpan Ghorai, Electronics & Communication Engg, West Bengal University of Technology, Haldia, India.
2Dibyendu Chowdhury, Electronics & Communication Engg, Haldia Institute of Technology, Haldia, India.
3Satyajit Das, Electronics & Communication Engg, West Bengal University of Technology, Haldia, India.

Manuscript received on April 11, 2012. | Revised Manuscript received on April 14, 2012. | Manuscript published on May 05, 2012. | PP: 354-358 | Volume-2 Issue-2, May 2012 . | Retrieval Number: B0616042212/2012©BEIESP
Open Access | Ethics and Policies | Cite 
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means defending information and information systems from unlicensed access, use, disclosure, disruption, modification or demolition. In this paper, a public key method of Steganography is proposed under standard cryptographic assumptions. The byte location in LSB of which the secret bit is to be embedded is found out by public key of the receiver and receiver apply private key of itself to reconstruct the secret message following RSA assumptions

Keywords: Communication, Security, Steganography. Public Key.