Open Access   Article Go Back

Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header

Basant Sah1 , V .K Jha2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 280-284, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.280284

Online published on Sep 30, 2018

Copyright © Basant Sah, V .K Jha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Basant Sah, V .K Jha, “Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.280-284, 2018.

MLA Style Citation: Basant Sah, V .K Jha "Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header." International Journal of Computer Sciences and Engineering 6.9 (2018): 280-284.

APA Style Citation: Basant Sah, V .K Jha, (2018). Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header. International Journal of Computer Sciences and Engineering, 6(9), 280-284.

BibTex Style Citation:
@article{Sah_2018,
author = {Basant Sah, V .K Jha},
title = {Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {280-284},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2859},
doi = {https://doi.org/10.26438/ijcse/v6i9.280284}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.280284}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2859
TI - Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCP/IP Header
T2 - International Journal of Computer Sciences and Engineering
AU - Basant Sah, V .K Jha
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 280-284
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
603 475 downloads 246 downloads
  
  
           

Abstract

This is the time of web, in which whole world is associated with one another, thus significance of security builds step by step. To protect the data from unauthorized user, it is the new challenge for us so that we developed a very simple technique to transfer the data from one party to other by secure channel. As we know that Steganography is a digital technique for hiding information in some form of media, such as image, audio or video. Steganography has advanced routine with regards to hide information in bigger document so that others can`t associate the nearness with a shrouded message. In this paper, we outline a framework, which utilizes highlights of both cryptography and in addition steganography, where TCP/IP header is utilized as a steganographic transporter to hide encrypted data. [1] Steganography is a valuable apparatus that permits secretive transmission of data over the correspondences channel. [2] In this paper we have use the MKA algorithm [4] to embed the data inside the image so that capacity of data will be large.

Key-Words / Index Term

LSB,Steganography, Cryptography, Encryption, TCP/IP Header, Fragmentation, MKA algorithm

References

[1] R.M. Goudar, Prashant N. Patil, Aniket G.. “Secure Data Transmission by using Steganography” ISSN 2224- per) ISSN 2224-896X Vol 2, No.1, 2012
[2] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn,”Information hiding- Survey”, IEEE, (7):1062- 1078, 1999.
[3] G. J. Simmons, “The Prisoner’s problem and the subliminal channel in Advances in Cryptology”, Proc.crypto ’83:55–67, 1983.
[4] . H.B.Kekre, Archana Athawale, and Pallavi N.Halarnkar ,” Increased Capacity of Information Hiding in LSB’s Method for Text and Image” World Academy of Science, Engineering and Technology Vol:2 2008-05-22.
[5] Udit Budddia and Deepak Kundur, “Digital video steganalysis exploiting collusion Sensitivity”,IEEE, 1(4):502- 516, 2006.
[6] Furuta, T,.Noda, H., Niimi, M., Kawaguchi E,”Bit-plane decomposition steganography using wavelet compressed video”, Joint Conference of the Fourth International Conference, 2(5): 970 - 974, 2003.
[7] V.Karthekayani and kammalakan, “Conversion grayscale image to color image with and without texture synthesis”, International journal of computer science and network security, 7(4):11-16, 2007.
[8] Eiji Kawaguchi and Richard O. Eason, “Principle and applications of BPCS- Steganography”, Proc. SPIE ,3528: 464-473 , 1999.
[9] Nameer N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm” Jordan Journal of Science publications, 3 (4): 223-232, 2007.
[10] K B Raja, C R Chowdary K R Venugopal, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Images”, IEEE, 170-176, 2005.
[11] Naofumi,” Technique of lossless steganography”, IEICE Transactions on Communications, 90(11):1-4, 2007.
[12] .Nan jiang and wan jiang, “Random oracle model of information modeling”, World academy of science, 18:1307-6884, 2006
[13] Steganography [tG. Pulcini, Stegotif,"http://www.geocities.com/SiliconValley/ 9210/gfree. Html, 10/28/2008
[14] K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory," The International Society for Optical Engineering, Electronic Imaging, San Jose, CA, USA, 2005.
[15] G. Xuan, Y. Q. Shi, D. Zou, J. Gao, C. Yang, Z. Zhabg, P. Chai, W. Chen, C. Chen, “Steganalysis based on multiple features formed by statistical moments of wavelet characteristic Functions," IH 2005 LNCS 3727, pp. 262-277, Springer-Verlag Berlin Heidelberg 2005.
[16] H. Noda, J. Spaulding, M. Shirazi, M. Niimi and E. Kawaguchi, “BPCS Steganography Combined with JPEG2000 Compression”, Proceedings of Pacific Rim Workshop on Digital Steganography , pp. 98-107, 2002.
[17] J. Huang and Y. Shi, “Adaptive image watermarking scheme based on visual masking”, Elect. Lett., vol. 34, no. 8, pp. 748-750,1998.
[18] A. Piva, M. Barni, F. Bartolini and V. Capellini, “DCT-Based watermark recovering without restoring to the uncorrupted original image”, in Proc. of IEEE ICIP, pp. 520-523, 1997. 438
[19] Rahul Jain,Naresh kumar .” Efficient data hiding scheme using lossless data compression and image steganograpgy “, International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 4 No.08 August 2012
[20] Swami Vivekanand Mahavidhyalaya etl,” Information Security: A Review on Steganography with Cryptography for Secured Data Transaction “,Int. J. Sc. Res. in Network Security and Communication , ISSN: 2321-3256 , Volume-5, Issue-6, Dec 2017 .
[21] A. Sudha1, A. Basheer Ahamed, ” Img-Protect : Privacy Protection of Images in Online Social Networks Using Watermarking Scheme “, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , Volume 3 | Issue 7 | ISSN : 2456-3307