CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach of Steganography using Hill Cipher

Published on March 2013 by Sainik Kumar Mahata, Anupam Mondal, Deepak Kumar, Pinaki Majumdar
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 3
March 2013
Authors: Sainik Kumar Mahata, Anupam Mondal, Deepak Kumar, Pinaki Majumdar
2a7ff673-63b8-4b16-b6bf-c94e5e49c95d

Sainik Kumar Mahata, Anupam Mondal, Deepak Kumar, Pinaki Majumdar . A Novel Approach of Steganography using Hill Cipher. International Conference on Computing, Communication and Sensor Network. CCSN2012, 3 (March 2013), 29-31.

@article{
author = { Sainik Kumar Mahata, Anupam Mondal, Deepak Kumar, Pinaki Majumdar },
title = { A Novel Approach of Steganography using Hill Cipher },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 3 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 29-31 },
numpages = 3,
url = { /specialissues/ccsn2012/number3/10866-1030/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Sainik Kumar Mahata
%A Anupam Mondal
%A Deepak Kumar
%A Pinaki Majumdar
%T A Novel Approach of Steganography using Hill Cipher
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 3
%P 29-31
%D 2013
%I International Journal of Computer Applications
Abstract

In the modern technological world, where data or image transfer through the internet has gained utmost importance, security of the data has become a major issue. We use cryptography for the security of the above mentioned data. By the help of cryptography, we convert plain text into cipher text, or data that is unreadable to the attacker. Another approach is to hide data in image and then send it to the receiver. This is known as steganography. Various approaches of steganography has been discovered earlier, which includes changing of data in pixels with the data that the sender needs to send. In the discussed approach, we will also find out the pixel matrix of an image, but we will multiply the found out matrix with a cipher matrix. In this way, we will convert the original image into encrypted image and then subject it to communication.

References
  1. R. J. Anderson and F. A. P. Petitcolas, "On the Limits of Steganography," J. Selected Areas in Comm. , vol. 16, no. 4, 1998, pp. 474–481.
  2. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding—A Survey," Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.
  3. J. Fridrich and M. Goljan, "Practical Steganalysis—State of the Art," Proc. SPIE Photonics Imaging 2002, Security and Watermarking of Multimedia Contents, vol. 4675, SPIE Press, 2002, pp. 1–13.
  4. B. Chen and G. W. Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. Information Theory, vol. 47, no. 4, 2001, pp. 1423–1443.
  5. N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26–34.
  6. A. Kerckhoffs, "La Cryptographie Militaire (Military Cryptography)," J. Sciences Militaires (J. Military Science, in French), Feb. 1883
Index Terms

Computer Science
Information Sciences

Keywords

Cipher Cipher Text Cryptography Decryption Encryption Matrix Plaintext