Information Security for Cloud using Image Steganography

  • Muhammad Amjad Khan Department of Computer Science, Quaid-I-Azam University, Islamabad.
Keywords: Cloud Computing, Steganography, K-Strange, Clustering Algorithm, Cryptography.


Cloud computing is getting involved in almost every technological field to serve customers in a more efficient way. The shared resources (pool) with different configurations according to the user’s needs are provided by cloud vendors. Users stores their data on the cloud, data can be personal, or organizational, and data of every type must be secure on clouds. Making the data secure and reducing the integrity of data during transfer through public channels. In this paper, we will try to make data secure using image steganography. Using the steganography technique, we use encryption-decryption of data into images and make data invisible.

How to Cite
Muhammad Amjad Khan. (2021). Information Security for Cloud using Image Steganography . Lahore Garrison University Research Journal of Computer Science and Information Technology, 5(1), 9-14.