StegoShield: Securing Secrets with GIF-Based Steganography and Cryptography
Akhina PV
Department of Computer Science Cyber Security
Vimal Jyothi Engineering College
Chemperi, Kannur
Email: akhinababu3540@gmail.com
Sreelakshmi suresh
Department of Computer Science Cyber Security
Vimal Jyothi Engineering College
Chemperi, Kannur
Email: sreelakshmistv@gmail.com
Deepnitha Ramachandran
Department of Computer Science Cyber Security
Vimal Jyothi Engineering College
Chemperi, Kannur
Email: deepnitharamachandran@gmail.com
Ms. Mafnitha KK
Assistant Professor
Department of Computer Science Cyber Security
Vimal Jyothi Engineering College
Chemperi, Kannur Email: mafnitha@vjec.ac.in
Saniya Sudhan
Department of Computer Science Cyber Security
Vimal Jyothi Engineering College
Chemperi, Kannur
Email: saniyasudhan123@gmail.com
Abstract—Steganography and visual cryptography are essen- tial techniques in secure digital communication, allowing for covert information exchange and secure data transmission. This paper explores various steganographic methods, with a focus on image steganography, including Least Significant Bit (LSB) substitution, transform domain approaches, and advanced meth- ods such as Spread Spectrum and Patchwork steganography. Additionally, the study examines visual cryptography (VC), which enables image encryption through secret sharing techniques. The effectiveness of different steganographic approaches is analyzed based on criteria such as invisibility, payload capacity, robustness, and resistance to detection. Comparative studies on stegano- graphic techniques in different image formats (BMP, GIF, JPEG) highlight their strengths and limitations. Furthermore, emerging research integrating steganography with deep learning and real- time encryption standards is discussed. The paper also reviews steganalysis techniques used for detecting hidden information, emphasizing the ongoing challenge of developing robust and generalizable detection methods. The findings contribute to the advancement of secure data hiding techniques, addressing the evolving demands of cybersecurity and covert communication in the digital era.