Preview

Steganography

Powerful Essays
Open Document
Open Document
1450 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
Journal of Engineering, Computers & Applied Sciences (JEC&AS) ISSN No: 2319-5606 Volume 2, No.1, January 2013 _________________________________________________________________________________

Adaptive Steganographic Algorithm using Cryptographic Encryption RSA Algorithms
Manoj Kumar Sharma, Jaipur National University Dr. Amit Upadhyaya, Jaipur National University Shalini Agarwal, Pursuing M.Tech, Banasthali University, Banasthali

ABSTRACT
Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network. This paper propose two different steganographic algorithms using RSA cryptographic algorithms and with some random functions. The message is transformed into a cipher audio signal using a key, concealed into another cover data using Steganography by converting it into an intermediate encrypted and message using random number generator and with the help of RSA algorithms. The proposed method thus achieves a high degree of security for information. Keywords— Metamorphic cryptography, Cryptography, Steganography, Matrix Multiplication, Angular Encryption, Dynamic Encryption, Color Key, Cipher Image, Intermediate Text, Color Key Matrix, Data Matrix, Paradox.

INTRODUCTION
Information security is of utmost importance in today’s fast developing era. Information or messages are being exchanged over various types of networks. With the huge growth of computer networks and advancement in technology, a huge amount of information is being exchanged. A large part of this information is confidential or private which increases the demand for stronger encryption techniques. Security



References: [1] Pramitha, K.; Suresh, L.P.; Shunmuganathan, K.L., “Image steganography using mod-4 embedding algorithm based on image contrast”, ISBN: 978-1-61284-654-5, Page(s): 364 – 369, 22 September 2011, IEEE. [2] Jie Yang; Weiwei Lin; Taojian Lu., “”, An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, World Automation Congress (WAC), 2012, ISBN: 978-1-4673-4497-5, Page(s): 525 – 530, 24-28 June 2012 , IEEE. [3] Jie Yang; Weiwei Lin; Taojian Lu , “An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, ISSN : 21544824, Page(s): 525 – 530, 24-28 June 2012,IEEE. Verification & Validation After completion of problem 2, finally we have to perform verification and validation process. In verification process we may check the bit streams of both, original message or extracted message, or may also check the size of both original of extracted www.borjournals.com Blue Ocean Research Journals 3

You May Also Find These Documents Helpful

  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Best Essays

    CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    In part (a.), the secret message is to be encrypted using DIFFIE HELLMAN and then to be embedded using DCT. At receiver’s end, the encrypted form of message needs to be retrieved from the image and then it is to be decrypted using the key of Diffie Hellman. Similarly the other parts are followed.…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Also, misused and unauthorized access to personal and private information has become a serious challenge in the digital world. Encryption is a classic and efficient method to solve these issues. However, traditional standard methods such as DES and AES are typically designed for textual information. Those methods due to certain characteristics such as large data and high correlation among pixels are not suitable for multimedia information…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S.…

    • 21530 Words
    • 87 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internet holds an important role for data transmission and sharing. Therefore, encryption is used to secure data transmission. Encryption achieves security effects that make the secret messages unreadable. This is known as Cryptography…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Subsequently, to secure the touchy data on the web different procedures like cryptography, steganography are utilized to shroud the information in advanced media. Cryptography just keeps the substance of the message mystery however some of the time it is important to keep the presence of the message mystery. In this way, a strategy which keeps the presence of a message mystery is known a steganography. This paper investigates the steganography system for security reason. Paper introduces the LSB procedure of picture steganography in which information is covered up in the blend of LSBs of picture…

    • 1359 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient realizes there is a hidden message. In this technique, a secret message is hidden within an ordinary message and the extraction of it is done at its destination. The term steganography combines the two Ancient Greek words Steganos and graphein, where “steganos” means “covered, concealed, or protected” and “graphein” means “writing or drawing”. Thus, steganography is covered writing. The main purpose of steganography is to hide the fact of communication. The need to ensure that only the right people have authorization to high-security accesses, has led to the…

    • 9982 Words
    • 40 Pages
    Good Essays
  • Powerful Essays

    Internet, fax, mobiles phones etc are the most common communication medium in use nowadays. The information used in these media is in digital format. Transmission of these digital forms of documents is done in a fraction of seconds. High compression and bit rates are required during transmission, to avoid expenses and…

    • 2501 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    KeywordsImage Quality Measures, Steganography, Steganalysis, HVS based IQM, Pixel based IQM. I. INTRODUCTION Hiding information in digital content has a wide class of application and the techniques involved in such applications are collectively referred to as information hiding techniques [1]. Steganography refers to the art/science of embedding information in the digital images, aiming to convey messages secretly by concealing its very existence. Compared with the Cryptography, modern steganography not only encrypts messages but also masks the very presence of the communication.…

    • 2605 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Steganography is a complex subject, please note that although it involves hiding messages, it is not cryptography. The…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Dynamic Source Routing

    • 375 Words
    • 2 Pages

    In this technical paper a session based symmetric key cryptographic technique, termed as SBSKCT, has been proposed. This proposed technique is very secure and suitable for encryption of large files of any type. SBSKCT considers the plain text as a string with finite no. of binary bits. This input binary string is broken down into blocks of various sizes (of 2k order where k = 3, 4, 5, ….). The encrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string cipher text is formed. Combination of values of block length, number of blocks and no. of iterations generates the session based key for SBSKCT. For decryption the cipher text is considered as binary string. Using the session key information, this binary string is broken down into blocks. The decrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string plain text is reformed.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays

Related Topics