NORMA eResearch @NCI Library

Securing passwords storage using image steganography by implementing AES encryption and Argon2 hashing

Parakh, Shubham Karodimal (2022) Securing passwords storage using image steganography by implementing AES encryption and Argon2 hashing. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
PDF (Master of Science)
Download (800kB) | Preview
[thumbnail of Configuration manual]
PDF (Configuration manual)
Download (623kB) | Preview


With the development of technology and advancements in data transmission methods, there have also been developments in the methods used to conceal and forge sensitive data such as a password. We thus need more advanced and improved methods for transmitting and storing this password. In the globalized era, storing passwords is a crucial duty, and ensuring their safety and security is as crucial. Both steganography, as well as cryptography, have their own issues, despite being intended to secure passwords. The issue with cryptography techniques is that the cipher data pretends to be ambiguous, so the attacker would either interrupt the communication or carefully examine the data as it travels between the sender and the recipient. The problem with the steganography technique is that even if concealed information is discovered or even suspected to be present the message has already been revealed. The research presented in this paper demonstrates a novel password security method with different system configurations that combine advanced hashing techniques along with a strong encryption mechanism and steganography. This makes the password impossible to crack by an attacker. In the proposed hybrid system the password is first hashed using the Argon2 hashing technique, then encryption is done through Advance Encryption Standard (AES), & lastly saved in the image using steganography. This increases the security of the stored password. The suggested model also generates high-quality steganography pictures and integrates more quickly with efficient encryption and decryption time.

Item Type: Thesis (Masters)
Verma, Rohit
Uncontrolled Keywords: Hashing; AES Encryption; Cryptography; steganography
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Tamara Malone
Date Deposited: 04 May 2023 15:31
Last Modified: 04 May 2023 15:31

Actions (login required)

View Item View Item