A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing
Sudipta Sahana1 , Abhipsa Kundu2
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-12 , Page no. 42-46, Dec-2014
Online published on Dec 31, 2014
Copyright © Sudipta Sahana , Abhipsa Kundu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sudipta Sahana , Abhipsa Kundu, “A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.42-46, 2014.
MLA Style Citation: Sudipta Sahana , Abhipsa Kundu "A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing." International Journal of Computer Sciences and Engineering 2.12 (2014): 42-46.
APA Style Citation: Sudipta Sahana , Abhipsa Kundu, (2014). A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing. International Journal of Computer Sciences and Engineering, 2(12), 42-46.
BibTex Style Citation:
@article{Sahana_2014,
author = {Sudipta Sahana , Abhipsa Kundu},
title = {A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {42-46},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=329},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=329
TI - A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing
T2 - International Journal of Computer Sciences and Engineering
AU - Sudipta Sahana , Abhipsa Kundu
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 42-46
IS - 12
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3799 | 3638 downloads | 3647 downloads |
Abstract
The enhancement of using internet system has increased the ease of information communication which throws challenge in data security. Now a days harmless and safe data transmission become more vital and significant. Cryptography and Steganography are two important areas of exploration that comprise a great percentage of applications. Cryptography is the expertise technology that involves encoding a message text into an unreadable text form that is known as cipher text and the steganography is an art and technology of hiding information in a multimedia file without causing statistically significant change to this file for involving a secret message transmission. In our suggested work the plain text is converted to a cipher text using the method of Cryptography, where different person can able to use their preferable key for encoding the text and also some Boolean algebraic operations are used in the succeeding steps and after that this cipher text is buried inside a cover media of gray scale image with dimension of 2n x 2n and a secure pictorial block steganography based encryption algorithm is proposed for transferring text message and also revealed the Cryptanalysis and Steganalysis technique for regaining data at receiver side. The experimental outcome indicates that for using different length of text message the distortion of picture is very much less that is negligible in open eyes. At last it can be mentioned that without knowing the appropriate knowledge of cryptanalysis and steganalysis retrieving of message is quite impossible.
Key-Words / Index Term
Cryptography, Steganography, Plain text, Cipher text, Cryptanalysis, Steganalysis
References
[1] Thomas Ristenpart , and Sriram Keelveedhi , Mihir Bellareand, “Message-Locked Encryption and Secure Deduplication”, Eurocrypt 2013, Volume 7881, 2013, pp 296-312
[2] RigDas , ThemrichonTuithung “A Novel Steganography Method for Image Based on Huffman Encoding”, 2012 IEEE
[3] G.KarthigaiSeivi, Leon Mariadhasan, K. L. Shunmuganathan ,“Steganography Using Edge Adaptive Image”, 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET]
[4] Themrichon Tuithung, Yam bern Jina Chanu and Kh. Manglem Singh, “A Short Survey on Image Steganography and Steganalysis Techniques”, 2012 IEEE
[5] Sumeetkar and kirtikaSingla “Hash Based Approach For Secure Image Steganography Using Canny Edge Detection Method”, ISSN-0973-7391, Vol. 3, Number 1, January-June 2012, pp. 155-157.
[6] Anjali Sardana, Siddhartha Malik, “A Keyless Approach to Image Encryption”, IEEE, International Conference on Communication Systems and Network Technologies 2012.
[7] Hassan Aghaeinia , Seyed Hamed Seyedi, and Ali Daneshkhah, “A More Secure Steganography Method in Spatial Domain”, Second International Conference on Intelligent Systems, Modelling and Simulation, 2011.
[8] S. Ghaemmaghami, S. Sarreshtedari , “High Capacity Image Steganography in Wavelet Domain,” International Conference on Consumer Communications and Networking,pp.1-6, 2010.