{"title":"Information Security for Cloud using Image Steganography","authors":"Muhammad Amjad Khan","doi":"10.54692/lgurjcsit.2021.0501171","DOIUrl":null,"url":null,"abstract":"Cloud computing is getting involved in almost every technological field to serve customers in a more efficient way. The shared resources (pool) with different configurations according to the user’s needs are provided by cloud vendors. Users stores their data on the cloud, data can be personal, or organizational, and data of every type must be secure on clouds. Making the data secure and reducing the integrity of data during transfer through public channels. In this paper, we will try to make data secure using image steganography. Using the steganography technique, we use encryption-decryption of data into images and make data invisible.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"33 11","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lahore Garrison University Research Journal of Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54692/lgurjcsit.2021.0501171","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing is getting involved in almost every technological field to serve customers in a more efficient way. The shared resources (pool) with different configurations according to the user’s needs are provided by cloud vendors. Users stores their data on the cloud, data can be personal, or organizational, and data of every type must be secure on clouds. Making the data secure and reducing the integrity of data during transfer through public channels. In this paper, we will try to make data secure using image steganography. Using the steganography technique, we use encryption-decryption of data into images and make data invisible.