Development of a Cloud-based Secure Text File Application using Hybrid Cryptography and Steganography
S.V.N. Srivalli1, Ben Swarup Medikonda2
1Ms. S.V.N. Srivalli, M. Tech Department of (Computer Science Engineering) Vignan’s Institute of Information Technology, Visakhapatnam India.
2Dr. Ben Swarup Medikonda, Professor and Dean Department of Computer Science and Engineering Vignan’s Institute of Information Technology Visakhapatnam. India.

Manuscript received on 04 April 2019 | Revised Manuscript received on 11 May 2019 | Manuscript published on 30 May 2019 | PP: 3267-3271 | Volume-8 Issue-1, May 2019 | Retrieval Number: F2947037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography and steganography are two popular ways to secretly send vital information. The first method distorts the message and the second method conceals the message’s existence. In this paper we are using two phases to provide more security to the text files which are as follows. The first phase is the storing process where the users chooses a text file and split it into two equal parts, then encrypt both the subparts of the text files. One with the Blowfish and the other with the AES algorithms then merge both the encrypted parts of the text fileand uploaded into the ownCloud. Then the keys that are used to encrypt both the subfiles are hidden behind a cover image by using the steganography LSB technique and sent to the user mails. The second phases are the retrieval process where theuser retrieves the keys from the stegno image and decrypts both the subparts of the text files and merge both the subparts. Thus, in this way we are providing more security to the text files that are uploaded into the cloud.
Keywords; AES, Blowfish, Cryptography, Frequency Domain, LSB, Spatial Domain, Steganography.

Scope of the Article: Cryptography and Applied Mathematics