Preview

Steganography

Powerful Essays
Open Document
Open Document
1450 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
Journal of Engineering, Computers & Applied Sciences (JEC&AS) ISSN No: 2319-5606 Volume 2, No.1, January 2013 _________________________________________________________________________________

Adaptive Steganographic Algorithm using Cryptographic Encryption RSA Algorithms
Manoj Kumar Sharma, Jaipur National University Dr. Amit Upadhyaya, Jaipur National University Shalini Agarwal, Pursuing M.Tech, Banasthali University, Banasthali

ABSTRACT
Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network. This paper propose two different steganographic algorithms using RSA cryptographic algorithms and with some random functions. The message is transformed into a cipher audio signal using a key, concealed into another cover data using Steganography by converting it into an intermediate encrypted and message using random number generator and with the help of RSA algorithms. The proposed method thus achieves a high degree of security for information. Keywords— Metamorphic cryptography, Cryptography, Steganography, Matrix Multiplication, Angular Encryption, Dynamic Encryption, Color Key, Cipher Image, Intermediate Text, Color Key Matrix, Data Matrix, Paradox.

INTRODUCTION
Information security is of utmost importance in today’s fast developing era. Information or messages are being exchanged over various types of networks. With the huge growth of computer networks and advancement in technology, a huge amount of information is being exchanged. A large part of this information is confidential or private which increases the demand for stronger encryption techniques. Security



References: [1] Pramitha, K.; Suresh, L.P.; Shunmuganathan, K.L., “Image steganography using mod-4 embedding algorithm based on image contrast”, ISBN: 978-1-61284-654-5, Page(s): 364 – 369, 22 September 2011, IEEE. [2] Jie Yang; Weiwei Lin; Taojian Lu., “”, An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, World Automation Congress (WAC), 2012, ISBN: 978-1-4673-4497-5, Page(s): 525 – 530, 24-28 June 2012 , IEEE. [3] Jie Yang; Weiwei Lin; Taojian Lu , “An approach to prove confidentiality of cryptographic protocols with non-atomic keys”, ISSN : 21544824, Page(s): 525 – 530, 24-28 June 2012,IEEE. Verification & Validation After completion of problem 2, finally we have to perform verification and validation process. In verification process we may check the bit streams of both, original message or extracted message, or may also check the size of both original of extracted www.borjournals.com Blue Ocean Research Journals 3

You May Also Find These Documents Helpful

  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Best Essays

    CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    People have desired to keep certain sensitive communications secret for thousands of years. In our new age of digital media and internet communications, this need often seems even more pressing. This paper presents general information about steganography, the art of data hiding. The paper provides an overview of steganography, general forms of steganography, specific steganographic methods, and recent developments in the field. The information presented in this paper is also applied to a program developed by the author, and some sample runs of the program are presented.…

    • 10575 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Transferring vital information securely without any threat of intrusion is extremely important. Crypography and steganography, both provide security to messages. But, it would be best if both of these are combined and provide a high-level of security. Cryptography only scrambles a message into a form which can’t be understood whereas steganography hides the information in a vessel like Image, Audio or Video. In this Paper, a combination of four techniques is done to analyze the level of security provided be them when they are combined. For cryptography, Diffie-Hellman and One Time Pad cryptography are used. For Steganography, DCT and DWT based techniques are considered. It is further concluded that cryptography combined with steganography offers great potential for securing of data copyright, and detection of infringers. Soon, through a combination of cryptography and steganography, personal messages, files, all artistic creations, pictures, and songs can be protected from piracy.…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    [2] Joan Daemen, Vincent Rijmen, "The Block Cipher Rijndael", Proceeding CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications, pp: 277 - 284, 2000.…

    • 2501 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Steganography is a complex subject, please note that although it involves hiding messages, it is not cryptography. The…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient realizes there is a hidden message. In this technique, a secret message is hidden within an ordinary message and the extraction of it is done at its destination. The term steganography combines the two Ancient Greek words Steganos and graphein, where “steganos” means “covered, concealed, or protected” and “graphein” means “writing or drawing”. Thus, steganography is covered writing. The main purpose of steganography is to hide the fact of communication. The need to ensure that only the right people have authorization to high-security accesses, has led to the…

    • 9982 Words
    • 40 Pages
    Good Essays
  • Satisfactory Essays

    Dynamic Source Routing

    • 375 Words
    • 2 Pages

    In this technical paper a session based symmetric key cryptographic technique, termed as SBSKCT, has been proposed. This proposed technique is very secure and suitable for encryption of large files of any type. SBSKCT considers the plain text as a string with finite no. of binary bits. This input binary string is broken down into blocks of various sizes (of 2k order where k = 3, 4, 5, ….). The encrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string cipher text is formed. Combination of values of block length, number of blocks and no. of iterations generates the session based key for SBSKCT. For decryption the cipher text is considered as binary string. Using the session key information, this binary string is broken down into blocks. The decrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string plain text is reformed.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    KeywordsImage Quality Measures, Steganography, Steganalysis, HVS based IQM, Pixel based IQM. I. INTRODUCTION Hiding information in digital content has a wide class of application and the techniques involved in such applications are collectively referred to as information hiding techniques [1]. Steganography refers to the art/science of embedding information in the digital images, aiming to convey messages secretly by concealing its very existence. Compared with the Cryptography, modern steganography not only encrypts messages but also masks the very presence of the communication.…

    • 2605 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Also, misused and unauthorized access to personal and private information has become a serious challenge in the digital world. Encryption is a classic and efficient method to solve these issues. However, traditional standard methods such as DES and AES are typically designed for textual information. Those methods due to certain characteristics such as large data and high correlation among pixels are not suitable for multimedia information…

    • 1090 Words
    • 5 Pages
    Better Essays

Related Topics