A Bespoke Technique for Secret Messaging

Автор: Mahimn Pandya, Hiren Joshi, Ashish Jani

Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis

Статья в выпуске: 5 vol.5, 2013 года.

Бесплатный доступ

The communication of digital assets on the internet infrastructure is increasing in its volume with threats on its security with regard to active and passive attacks of eavesdroppers. This concern has opened up the research channel to improve the techniques of secure and reliable communication protecting intellectual property rights and message security. Constant efforts of researchers in this area to achieve communication at faster rate maintaining security of digital assets, is giving improved techniques to achieve the goal. The efforts made here in this work are in the direction to enhance level of security in making faster reliable and secure communication. In spite of continued efforts, still as on today, it is challenging to hide the communication from eavesdropper. The disciplines of Cryptography, Steganography and Digital Watermarking are still popular areas of research. They are continuously digging to find robust and effective algorithms to protect digital communications and digital assets. It is very true that if the complexity in algorithm is increased, higher security level can be achieved. In the reviewed work, Researchers have developed algorithms for text encryption and embedment in digital watermarking using LSB at cost of time. The proposed work is targeted to maintain the tradeoff between the complexity level of algorithm and security level of message considering the time factor. The proposed work has evolved with two algorithms: AMEADT (ASCII Message Encryption and Decryption Technique) to protect secret message and AMEAET (ASCII Message Embedment and Extraction Technique) to embed encrypted text to digital image. The implementation of these algorithms has resulted in justifying higher level of security with comparatively lower level of complexity of algorithm.

Еще

Steganography, Hiding Information, Image Pixel Values, AMEADT, AMEAET, Cipher Text, Key

Короткий адрес: https://sciup.org/15011190

IDR: 15011190

Список литературы A Bespoke Technique for Secret Messaging

  • . R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative Analysis of Image Steganography", International Journal of computer Applications (0975-8887), May, 2010, Vol 2, No. 3.
  • . Bret Dunber, "Steganographic Techniques and their use in an Open-Systems Environment", SANS Institute, 01/18/2002.
  • . D. Aucsmith, "An information-theoretic model for steganography", Proceedings of the second Intel. Workshop on Information Hiding, April, 1998, pg. 306-318.
  • . J. Nath, "Advanced Steganography Algorithm using Encrypted secret message,", IJCSA, vol. 2, no. 3, 2011.
  • . A. Nath, S. Ghosh, M. A. Mallik, "Symmetric Key Cryptography using Random Key generator:" Proceedings of International conference on security and management(SAM2010) held at Las Vegas, USA Jully 12-15, 2010), P-Vol-2, 239-244 (2010).
  • . J. Nath and A. Nath, "Advanced Steganography Algorithm using encrypted secret message" International Journal of Advanced Computer Science and Applications, Vol-2, No-3, Page-19-24, March(2011).
  • . D. Chatterjee, J. Nath, S. Dasgupta and A. Nath, "A new Symmetric key Cryptography Algorithm using extended MSA method :DJSA symmetric key algorithm", Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 3-5 June,2011, Page-89-94.
  • . N. Khanna, J. James, J. Nath, S. Chakraborty, A. Chakrabarti and A. Nath "New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm" Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.
  • . D. Das, J. Nath, M. Mukherjee, N. Chaudhury and A. Nath, "An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm", Proceedings of IEEE conference WICT-2011 held at Mumbai University Dec 11-14,2011
  • . J. Nath. et. al. "Symmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm" IJCA, Volume 42– No.1, March 2012
  • . D. Chatterjee, J. Nath, S. Das, S. Agarwal and A. Nath, "Symmetric key Cryptography using modified DJSSA symmetric key algorithm", Proceedings of International conference Worldcomp 2011 held at Las Vegas, USA, July 18-21, Page 312-318, Vol-I(2011).
  • . D. Chatterjee, J. Nath, S. Mondal, S.eep Da.key Cryptography using extended MSA method: DJSSA symmetric key algorithm" Jounal of Computing, Vol3, issue-2, Page 66-71,Feb(2011).
  • . M. Sreerama Murty, D. Veeraiah, and a Srinivas Rao, "Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis," Signal & Image Processing : An International Journal, vol. 2, no. 2, pp. 170–179, Jun. 2011.
  • . A. Houmansadr and S. Ghaemmaghami, "A Digital Image Watermarking Scheme Based on Visual Cryptography *," pp. 1–5.
  • . Cryptography and Network, Willian Stallings, Prentice Hall of India.
  • . I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Second Edi. Morgan Kaufmann Publishers, Elsevier, 2008.
  • . http://www.fi.muni.cz/ Definition of Steganography [ppt CHAPTER 13 - Steganography and Watermarking]
  • . Ismail Avcıbas¸, Member, IEEE, Nasir Memon, Member, IEEE, and Bülent Sankur, Member, IEEE, "Steganalysis Using Image Quality Metrics", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 12, NO. 2, FEBRUARY 2003
  • . R. L. de Queiroz, "Processing JPEG-compressed images and documents.," IEEE transactions on image processing : a publication of the IEEE Signal Processing Society, vol. 7, no. 12, pp. 1661–72, Jan. 1998..
  • . M. Sreerama Murty, D. Veeraiah, and a Srinivas Rao, "Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis," Signal & Image Processing : An International Journal, vol. 2, no. 2, pp. 170–179, Jun. 2011.
  • . Raman, S. (2010). Image Processing Using Scilab, 1–29.
Еще
Статья научная