Steganography

Powerful Essays
Journal of Engineering, Computers & Applied Sciences (JEC&AS) ISSN No: 2319-5606 Volume 2, No.1, January 2013 _________________________________________________________________________________

Adaptive Steganographic Algorithm using Cryptographic Encryption RSA Algorithms
Manoj Kumar Sharma, Jaipur National University Dr. Amit Upadhyaya, Jaipur National University Shalini Agarwal, Pursuing M.Tech, Banasthali University, Banasthali

ABSTRACT
Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network. This paper propose two different steganographic algorithms using RSA cryptographic algorithms and with some random functions. The message is transformed into a cipher audio signal using a key, concealed into another cover data using Steganography by converting it into an intermediate encrypted and message using random number generator and with the help of RSA algorithms. The proposed method thus achieves a high degree of security for information. Keywords— Metamorphic cryptography, Cryptography, Steganography, Matrix Multiplication, Angular Encryption, Dynamic Encryption, Color Key, Cipher Image, Intermediate Text, Color Key Matrix, Data Matrix, Paradox.

INTRODUCTION
Information security is of utmost importance in today’s fast developing era. Information or messages are being exchanged over various types of networks. With the huge growth of computer networks and advancement in technology, a huge amount of information is being exchanged. A large part of this information is confidential or private which increases the demand for stronger encryption techniques. Security



References: [1] Pramitha, K.; Suresh, L.P.; Shunmuganathan, K.L., “Image steganography using mod-4 embedding algorithm based on image contrast”, ISBN: 978-1-61284-654-5, Page(s): 364 – 369, 22 September 2011, IEEE. [2] Jie Yang; Weiwei Lin; Taojian Lu., “”, An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, World Automation Congress (WAC), 2012, ISBN: 978-1-4673-4497-5, Page(s): 525 – 530, 24-28 June 2012 , IEEE. [3] Jie Yang; Weiwei Lin; Taojian Lu , “An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, ISSN : 21544824, Page(s): 525 – 530, 24-28 June 2012,IEEE. Verification & Validation After completion of problem 2, finally we have to perform verification and validation process. In verification process we may check the bit streams of both, original message or extracted message, or may also check the size of both original of extracted www.borjournals.com Blue Ocean Research Journals 3

You May Also Find These Documents Helpful

  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography…

    • 928 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Steganography

    • 2046 Words
    • 9 Pages

    SteganoGRAPHY documentation 1. Introduction 1.1 Purpose This SDS describes the various functions of our project. The actual design of the various modules and components of Student Information System is described in this document which takes care of various functionalities that our project aims to achieve and for determining the operating characteristics of the system. 1.2 Intended Audience and Reading Suggestions This SDS document is intended for any developers, project manager or documentation…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Steganography

    • 277 Words
    • 2 Pages

    matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganograpy…

    • 277 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    INTRODUCION Steganography is the art of concealing private or sensitive information within a carrier that for all intents and purposes, appears innocuous. It comes from the Greek words steganós (covered) and graptos (writing). Simply put, if you were to view the presented information, it would appear to be something that does not warrant further analysis due to the fact that it does not LOOK or SOUND like anything that contains sensitive information. Steganography has been used for hundreds of years…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Steganography

    • 527 Words
    • 6 Pages

    STEGANOGRAPHY IN VIDEOS SONAM GUMBER 1156357 OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA Java is a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation…

    • 527 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Steganography

    • 32606 Words
    • 131 Pages

    APPLE Support offers drivers, technical support and other resources online. APPLE support is customized to meet customer’s needs. Its best known software prodocts are APPLE MAC Operating systems, APPLE office, office suite and Internet Explorer web browser. APPLE cell phone like MS1, marketed as a flexible, mid-sized and mid-range computer for people who do not need a technical powerhouse nor a computer that skimps on basic common features. APPLE longterm objectives are modify cellphone design…

    • 32606 Words
    • 131 Pages
    Satisfactory Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    Abstract This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    What is Steganography?

    • 3206 Words
    • 13 Pages

    A Genetic algorithm based crypt-steganography technique for message hiding in JPEG images Aleem Ali*, Sherin Zafarb, Reshmi Philip a) M.Tech Scholar, Jamia Hamdard(Hamdard University), Hamdard Nager, N.D-110062 b) F/O Engg, University Polytechnic, JMI, New Delhi-110025 Email: aleem08software@gmail.com, sherin_zafar84@yahoo.com, reshmiphilip@gmail.com Running Head: A Genetic algorithm based crypt-steganography technique for message hiding in JPEG images *To whom correspondence…

    • 3206 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Required 23 6. Code Snippets 24 7. Screen Shots 28 8. Testing 35 9. Conclusion 38 10. Bibliography 39 2. PROJECT DESCRIPTION What Is Steganography? Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Modern Steganography

    • 2063 Words
    • 9 Pages

    Modern Steganography Abstract This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots…

    • 2063 Words
    • 9 Pages
    Powerful Essays