Steganography

Topics: Cryptography, Encryption, Bit Pages: 6 (1450 words) Published: February 26, 2013
Journal of Engineering, Computers & Applied Sciences (JEC&AS) ISSN No: 2319-5606 Volume 2, No.1, January 2013 _________________________________________________________________________________

Adaptive Steganographic Algorithm using Cryptographic Encryption RSA Algorithms Manoj Kumar Sharma, Jaipur National University Dr. Amit Upadhyaya, Jaipur National University Shalini Agarwal, Pursuing M.Tech, Banasthali University, Banasthali

ABSTRACT
Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network. This paper propose two different steganographic algorithms using RSA cryptographic algorithms and with some random functions. The message is transformed into a cipher audio signal using a key, concealed into another cover data using Steganography by converting it into an intermediate encrypted and message using random number generator and with the help of RSA algorithms. The proposed method thus achieves a high degree of security for information. Keywords— Metamorphic cryptography, Cryptography, Steganography, Matrix Multiplication, Angular Encryption, Dynamic Encryption, Color Key, Cipher Image, Intermediate Text, Color Key Matrix, Data Matrix, Paradox.

INTRODUCTION
Information security is of utmost importance in today’s fast developing era. Information or messages are being exchanged over various types of networks. With the huge growth of computer networks and advancement in technology, a huge amount of information is being exchanged. A large part of this information is confidential or private which increases the demand for stronger encryption techniques. Security has become a critical feature for thriving networks. Communication is not secure due to the presence of hackers who wait for a chance to gain access to confidential data.[2] Cryptography is derived from the Greek words “kryptos” (meaning “hidden”) and “graphein” (meaning “to write”). Cryptography is the study of means of converting information from its normal comprehensible form into an incomprehensible format, rendering it unreadable without the secret knowledge. The process of converting information (plain text) by transforming it into unreadable format (cipher text) is known as encryption. Encryption techniques can be sometimes broken by cryptanalysis, also called as code breaking, although modern cryptographic techniques are virtually unbreakable. Cryptography encrypts the actual message that is being sent. This mechanism employs mathematical schemes and algorithms to scramble data into unreadable text. It can only be decoded or decrypted by the party that possesses the associated key [3].

Figure 1: A block diagram of the encoder. Steganography is derived from the Greek word “stegnos” (meaning “covered/secret”) and “graphein” (meaning “to write/draw”) [4]. Steganography is the study of means of concealing the information in order to prevent hackers from detecting the presence of the secret information. The process of concealing the message in a cover without leaving a remarkable trace is known as Steganography. Steganography is the form of convert communication in which a secret message is camouflaged with a carrier data. Steganography masks the very presence of communication, making the true message not discernable to the observer. Cryptography and Steganography achieve the same goal using different means. Encryption encodes the data so that an unintended recipient cannot determine its intended meaning. Steganography in contrast attempts to prevent an unintended recipient from suspecting that the data

www.borjournals.com

Blue Ocean Research Journals...

References: [1] Pramitha, K.; Suresh, L.P.; Shunmuganathan, K.L., “Image steganography using mod-4 embedding algorithm based on image contrast”, ISBN: 978-1-61284-654-5, Page(s): 364 – 369, 22 September 2011, IEEE. [2] Jie Yang; Weiwei Lin; Taojian Lu., “”, An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, World Automation Congress (WAC), 2012, ISBN: 978-1-4673-4497-5, Page(s): 525 – 530, 24-28 June 2012 , IEEE. [3] Jie Yang; Weiwei Lin; Taojian Lu , “An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, ISSN : 21544824, Page(s): 525 – 530, 24-28 June 2012,IEEE.
Verification & Validation
After completion of problem 2, finally we have to perform verification and validation process. In verification process we may check the bit streams of both, original message or extracted message, or may also check the size of both original of extracted
www.borjournals.com
Blue Ocean Research Journals
3