To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information
The sequential steps of proposed method to secure the secret information from sender side are summarized as follows:
1. Choose file to be secure.
2. Convert original information file into encrypted file using BLOWFISH algorithm.
3. Hide encrypted file using LSB approach and generate stego image.
The sequential steps of proposed method to secure the secret information from receiver side are summarized as follows:
1. Choose stego image.
2. Extract encrypted file using LSB approach.
3. Decrypt encrypted file using BLOWFISH algorithm and find out original information file.
For higher security first of all proposed work uses BLOWFISH algorithm to encrypt secret information then
encrypted information is hide by LSB approach.