Back to Current Issues

Secret Data Transmission Using Combination of Cryptography &Steganography

Ajin P Thomas, Sruthi P.S, Jerry Rachel Jacob, Vandana V Nair , Reeba R

Sreebuddha College Of Engineering, Alappuzha , India
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]

Secure communication is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Two varieties of security mechanism, cryptography and steganography are being applied. At the preceding stage, encryption is being provided to secret plain text using Vernam cipher (One-Time Pad) transposition technique. At the later stage, it transforms ciphertext into bytes and divides each byte into pairs of bits and assigns the decimal values to each pair, which is known as a master variable. Master variable value range will vary between 0 to 3. Depending upon the master patchy value, add that cipher text in the career image at Least Significant Bit (LSB) 6 th and 7 th bit location or 7 th and 8 th bit location or 7 th and 6 th or 8 th and 7 th bit location. Vernam cipher show good performance metrics regarding less CPU running time, fIle size same after Encryption and strong avalanche effect compare with all transposition cipher. After completion of embedding and sending the stego image to the receiver side, retrieving process of the cipher text from the said locations will be done. Moreover, then decryption process to get the secret plain text back will be performed using the Vernam cipher transposition algorithms.

Ajin P Thomas, “Secret Data Transmission Using Combination of Cryptography &Steganography”, International Journal of Computer Engineering In Research Trends, 4(5):171-175 ,May -2017.

Keywords : Cryptography &Steganography

[I] R. J. Anderson and F. A.P. Petitcolas, "On The Limits of Steganography", IEEE Journal of selected Areas in communication, 16(4), pp. 474-481,Special Issue on Copyright & Privacy protection. ISSN 0733-8716, May 1998.
 [2] M. A. B. Younes and A. Jantan, "A New Steganography Approach for Image Encryption Exchange by using the LSB insertion", IJCSNS International Journal of Computer Science & Network Security, Vol 8, No 6 , pp. 247-254, June 2008.
 [3] G. Swain and S .. K .. Lenka, "Steganography-Using a Double Substitution Cipher", International Journal of Wireless Communications and Networking, Volume 2, Number I, pp.35-39. ISSN: 0975-7163, June 2010. 
[4] G. Swain and S. K. Lenka, " A Technique for Secure Communication using Message Dependent Steganography",Special issue of IJCCT, Vol. 2,No. 12,2010.
 [5] G. Swain and S. K. Lenka, "Steganography using the Twelve Square Substitution Cipher and Index Variable" ,IEEE transactions on Image Processing, pp. 84-88, 2011.
 [6] A. Nag, J. P. Singh, S. Khan and S. Ghosh," A Weighted Location Based LSB Image Steganography Technique", Springer ACC 2011, Part II, CCIS 191, pp. 620-627, 20 II.
 [7] C. Maiti, D. Baksi, I. Zamider, P. Gorai and D. R. Kisku," Data Hiding in Images Using Some Efficient Steganography Techniques",Springer SIP 2011, CCIS 260, pp. 195-203, 20 II. 
[8] B. Li,.,et al. "A survey on image steganography and steganalysis", Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142172, 2011. 
[9]G. Swain and S . .K .. Lenka, "A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher" Advanced Materials Research, voI.403-408, pp.842-849,2012. 
[10] S. Padmapriya, S. Saravanapriya and D. Jayachitra," Performance Analysis of Various Encryption Algorithms for Data Communication", International Journal of Computer 

DOI Link : Not yet assigned

Download :

Refbacks : There are Currently No refback

Quick Links


Science Central

Score: 13.30

Submit your paper to [email protected]