An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content
R. Sharma1 , A. Dwivedi2 , V. Namdeo3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-9 , Page no. 176-182, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.176182
Online published on Sep 30, 2018
Copyright © R. Sharma, A. Dwivedi, V. Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: R. Sharma, A. Dwivedi, V. Namdeo, “An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.176-182, 2018.
MLA Style Citation: R. Sharma, A. Dwivedi, V. Namdeo "An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content." International Journal of Computer Sciences and Engineering 6.9 (2018): 176-182.
APA Style Citation: R. Sharma, A. Dwivedi, V. Namdeo, (2018). An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content. International Journal of Computer Sciences and Engineering, 6(9), 176-182.
BibTex Style Citation:
@article{Sharma_2018,
author = {R. Sharma, A. Dwivedi, V. Namdeo},
title = {An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {176-182},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2840},
doi = {https://doi.org/10.26438/ijcse/v6i9.176182}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.176182}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2840
TI - An Approach of LSB- Symmetric Cryptography to Secure Classified Text Content
T2 - International Journal of Computer Sciences and Engineering
AU - R. Sharma, A. Dwivedi, V. Namdeo
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 176-182
IS - 9
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
806 | 304 downloads | 205 downloads |
Abstract
The proposed idea provides information that obscures the idea with the combination of cryptography and steganography. Proposed ideas are important to support verification, confidentiality and fairness. To achieve these effects, the main idea is to use a symmetric cryptography system for privacy and validation security, mainly an incomplete reliability key supported by the steganography method. The proposed idea is primarily dependent on the security with the coding of the emission data is covered in the first phase and the data in the next phase encrypted discharge, so that it ensures a double security for a discharge date. Exhibited steganography idea, image or content as the information first (as a picture) coded and packaged by correlation with minimal image collective size after compressed data were shaken by symmetric cryptographic process using a private key of 128 bits of coded data, this private key splits via a private channel between the sender and the payee, and finally inserts encrypted data into the bitplanes of the title image using the smallest noteworthy piece (LSB) of the standard stereographic procedure. To achieve a high security strategy, the proposed steganography strategy has used random numbering (RAND) which selects an irregular LSB from the envelope. The results shown demonstrate the implementation and feasibility of the proposed proposal for inclusion of the peek flag on sedimentation rate (PSNR), compound and entropy.
Key-Words / Index Term
Decryption, Encryption, Internet, Steganography, Security etc
References
[1] Nisha Kundu, Dr. Amadeep Kaur “Secure Approach to Audio Steganography”International Journal of Engineering Trends and Technology (IJETT) , 2017
[2] Sujarani Rajendran, Manivannan Doraipandian “Chaotic Map Based Random Image Steganography Using LSB Technique”, International Journal of Network Security, 2017
[3] Reza tavoli, Maryam bakhshi, Fatemeh salehian, "A New Method for Text Hiding in the Image by Using LSB" (IJACSA) International Journal of Advanced Computer Science and Applications, 2016
[4] Rajalakshmi, Sowjanya.TP2, Hemanthkumar, “Image Steganography using H-LSB Technique for Hiding Image and Text Using Dual encryption method” SSRG International Journal of Electronics and Communication Engineering , 2015
[5] G Prabakaran, R. Bhavani, P.S. Rajeswari, “Multi secure and robustness for medical image based steganography scheme” International Conference on Circuits, Power and Computing Technologies (ICCPCT), 2013
[6] M.K Ramaiya. ; N.Hemrajani, ; , A.K Saxena. “Security improvisation in image steganography using DES” IEEE 3rd International on Advance Computing Conference (IACC), 2013
[7] N. Akhtar, ; P. Johri, ; S Khan, “Enhancing the Security and Quality of LSB Based Image Steganography” 5th International Conference on Computational Intelligence and Communication Networks (CICN), 2013
[8] Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar “An Image Steganography Technique using X-Box Mapping” IEEE-International Conference On Advances In Engineering, Science And Management , 2012
[9] RigDas and Themrichon Tuithung ”A Novel Steganography Method for Image Based on Huffman Encoding” IEEE, 2012
[10] Rengarajan Amirtharajan Anushiadevi .R2, Meena .y2, Kalpana. y2 and John Bosco Balaguru “Seeable Visual But Not Sure of It” IEEE-International Conference On Advances In Engineering, Science And Management, 2012
[11] G.Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” IEEE International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012
[12] L.Jani Anbarasi and S.Kannan “Secured Secret Color Image Sharing With Steganography” IEEE, 2012
[13] Thomas Leontin Philjon. and Venkateshvara Rao. “Metamorphic Cryptography - A Paradox between Cryptography and Steganography Using Dynamic Encryption” IEEE-International Conference on Recent Trends in Information Technology, ICRTIT , 2011
[14] Ashwak M. AL-Abiachi, Faudziah Ahmad and Ku Ruhana “A Competitive Study of Cryptography Techniques over Block Cipher” UKSim 13th IEEE International Conference on Modelling and Simulation, 2011
[15] Abhishek Gupta, Sandeep Mahapatra and, Karanveer Singh “ Data Hiding in Color Image Using Cryptography with Help of ASK Algorithm”, 2011
[16] Rosziati Ibrahim and Teoh Suk Kuan “Steganography Algorithm to Hide Secret Message inside an Image” Computer Technology and Application, (2011)
[17] Mohit Kulkarni, Maitreyee Phatak, Uma Rathod, Sudhir Prajapati, Mrs. Shivganga Mujgond “Efficient Data Hiding Scheme Using Audio Steganography”, International Research Journal of Engineering and Technology (IRJET), 2016
[18] Manoj Kumar, Naveen Hemrajani and Anil Kishore Saxena “Security Improvisation in Image Steganography using DES” IEEE, 2012
[19] Sesha Pallavi Indrakanti , P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887), 2011
[20] Qais H. Alsafasfeh , Aouda A. Arfoa, Image Encryption Based on the General Approach for Multiple Chaotic Systems Journal of Signal and Information Processing, 2011
[21] M.J.Thenmozhi, Dr.T.Menakadevi “A New Secure Image Steganography Using Lsb And Spiht Based Compression Method”, International Journal of Engineering Research & Science (IJOER), 2016
[22] Amnesh Goel, Reji Mathews, Nidhi Chandra “Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices” International Journal of Computer Applications (0975 – 8887) , 2011
[22] Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar, Image Encryption Using Affine Transform and XOR Operation ,International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011
[23] Seyed Hossein Kamali, Reza Shakerian, Maysam Hedayati, Mohsen Rahmani “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption ”2010 IEEE International Conference on Electronics and Information Engineering ICEIE, 2010
[24] ZHANG Yun-peng, ZHAI Zheng-jun, LIU Wei, NIE Xuan, CAO Shui-ping, DAI Wei-di “Digital Image Encryption Algorithm Based on Chaos and Improved DES” ”Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA, 2009
[25] Obaida Mohammad Awad Al-Hazaimeh “Hiding Data in Images Using New Random Technique” IJCSI International Journal of Computer Science Issues, 2012
[26] Nada ElyaTawfiq “Hiding Text within Image Using LSB Replacement” IOSR Journal of Computer Engineering (IOSR-JCE), 2013
[27] Hyder Yahya Atown “Hide and Encryption Fingerprint Image by using LSB and Transposition Pixel by Spiral Method” International Journal of Computer Science and Mobile Computing, 2014
[28] Rajalakshmi, Sowjanya.TP, “Image Steganography using H-LSB Technique for Hiding Image and Text Using Dual encryption method” SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE), 2015
[29] Arun Karthick, Kavitha, Sivakumar, Surender, “A Hybrid Method For Covert Communication Using Steganography And Image Fusion”, International Journal of Advances in Engineering & Technology, May, 2014.
[30] Manpreet Kaur, Vinod Kumar Sharma “Encryption based LSB Steganography Technique for Digital Images and Text Data”, IJCSNS International Journal of Computer Science and Network Security, 2016