Open Access   Article Go Back

A New Method of Secure Communication with Crystography

Suganya A.1 , Sharmila R.2 , Gopinathan N.3

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 225-228, Apr-2014

Online published on Apr 30, 2014

Copyright © Suganya A., Sharmila R., Gopinathan N. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Suganya A., Sharmila R., Gopinathan N., “A New Method of Secure Communication with Crystography,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.225-228, 2014.

MLA Style Citation: Suganya A., Sharmila R., Gopinathan N. "A New Method of Secure Communication with Crystography." International Journal of Computer Sciences and Engineering 2.4 (2014): 225-228.

APA Style Citation: Suganya A., Sharmila R., Gopinathan N., (2014). A New Method of Secure Communication with Crystography. International Journal of Computer Sciences and Engineering, 2(4), 225-228.

BibTex Style Citation:
@article{A._2014,
author = {Suganya A., Sharmila R., Gopinathan N.},
title = {A New Method of Secure Communication with Crystography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {225-228},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=144},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=144
TI - A New Method of Secure Communication with Crystography
T2 - International Journal of Computer Sciences and Engineering
AU - Suganya A., Sharmila R., Gopinathan N.
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 225-228
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3541 3468 downloads 3605 downloads
  
  
           

Abstract

In the development of digital communication the need for security of data is often required. In this paper, a new method is Crystography, a combination of Cryptography and Steganography together through image processing. Cryptography is the process of converting the data into gibberish form whereas; Steganography is to embed secret data in a multimedia file as carriers, so that it will not be able to detect that a secret data existing in the file. This system is able to perform both techniques using keys for Cryptography and image as cover objects for Steganography. So, first the data is converted into cipher text using RSA algorithm of Cryptography. Secondly the encrypted data is to be hidden using LSB algorithm of Steganography. By combining both techniques more security is obtained.

Key-Words / Index Term

Crystography, Cryptography, Steganography

References

Ankit Anand and Pushkar Praveen �Implementation of RSA Algorithm on FPGA� International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July � 2012.
[2] Chandra M. Kota and Cherif Aissi1� Implementation Of The RSA Algorithm And Its Cryptanalysis� ASEE Gulf-Southwest Annual Conference, The University of Louisiana at Lafayette, March 20 � 22, 2002.
[3] Fadhil Salman Abed A Proposed Method Of Information Hiding Based On Hybrid Cryptography And Steganography in International Journal of application in Engineering and Management, Vol 2, Issue 4, 2013
[4] Gurmeet Kaur and Aarti Kochhar,A �Steganography Implementation Based On LSB & DCT � International Journal for Science and Emerging Technologies with Latest Trends� in vol 4, 2012.
[5] Mihir,H and Rajyaguru �Crystography: combination of cryptography and steganography� in International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 10, October 2012.
[6] Inderjeet Kaur �Digital Stegnaography:hiding data within data� in ITM voyager volume 2, no 1, july-dec 2005.
[7] Padmashree,G and Venugopala,P �Audio Steganography and Cryptography: Using LSB Algorithm at 4th and 5th LSB layers� in International Journal Of Engineering and innovative Technology volume 2, issue 4, October 2012.
[8] Samidha Diwedi Sharma and Dipesh Agrawal �Analysis of Random Bit Image Steganography Techniques� in International Journal of Computer Applications 2013.
[9] Po-Yueh Chen* and Hung-Ju Lin �A DWT Based Approach for Image Steganography� in International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
[10] K B Shiva Kumar, "Bit Length Replacement Steganography Based On DCT Coefficients", in International Journal of Engineering Science and Technology, Vol. 2(8), Pg: 3561-3570,2010.