CFP last date
20 May 2024
Reseach Article

A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality

by Shubhi Jain, Sini Shibu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 11
Year of Publication: 2014
Authors: Shubhi Jain, Sini Shibu
10.5120/17859-8745

Shubhi Jain, Sini Shibu . A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality. International Journal of Computer Applications. 102, 11 ( September 2014), 24-28. DOI=10.5120/17859-8745

@article{ 10.5120/17859-8745,
author = { Shubhi Jain, Sini Shibu },
title = { A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 11 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number11/17859-8745/ },
doi = { 10.5120/17859-8745 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:50.777904+05:30
%A Shubhi Jain
%A Sini Shibu
%T A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 11
%P 24-28
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today's in modern world security is the main issue while communication. Internet is main source for communication but also it is not as much secure as it assume. For secure transmission of data many algorithms have been developed. Steganography and encryption/decryption algorithms are used for confidentiality. Some times to improve the security both the algorithms are combined. There is always a trade to develop an algorithm which provides high security in less time than the existing one. This paper proposed a new structure called HCCA (High Confidentiality Cryptography Algorithm) which is a combination of encryption/decryption and steganography algorithm. The key feature of this algorithm is that it is highly secure, time efficient and required small cover file.

References
  1. Manoj Kumar Ramaiya, Naveen Hemrajani, Anil Kishore Saxena, "Security Improvisation in Image Steganography using DES", IEEE-2012.
  2. Thomas Leontin Philjon. J, Venkateshvara Rao. N, Metamorphic Cryptography -A Paradox between Cryptography and Steganography Using Dynamic Encryption, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011.
  3. Yambin Jina Chanu , Themrichon Tuithung , Kh Manglem singh," A Short Survey on Image Steganography and Steganalysis Technique " , IEEE Trans, 2012 science and Management (ICAESM- 2012) 709 -713.
  4. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forens. Security 5 (2) (2010) 201-214.
  5. Ge Huayong, Huang Mingsheng, Wang Qian , "Steganography and Steganalysis Based on Digital Image", IEEE Trans. International Congress on Image and Signal Processing,(2011) 252-255.
  6. Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Parta Pratim Sarkar " An Image Steganography Technique using X-Box Mapping", IEEE Trans. International Conference Advances in Engineering,
  7. Guilliang Zhu, Weiping Wang, "Digital Image Encryption algorithm based on pixel", ICIS – 2010 IEEE International Conference 29-31 Oct 2010, pp – 769 – 772.
  8. Jasmin Cosic , Miroslav Bacai, " Steganography and Steganalysis Does Local web Site contain "Stego" Contain " , 52 th IEEE Trans. International Symposium ELMAR-2010, Zadar, Croatia 2009 ,pp 85 –88.
  9. Zhang Yun-peng , Liu Wei " Digital Image Encryption Algorithm Based on chaos and improved DES ", System, man and Cybernatics ,SMC 2009 , IEEE International Conference 11-14 Oct 2009, pp 474-479.
  10. Saeed R. Khosravirad, Taraneh Eghlidos and Sharokh Ghaemmaghami, "Higher Order Statistical of Random LSB Steganography", IEEE Trans. 2009, pp 629 - 632.
  11. J. Mielikainen, LSB Matching Revisited, IEEE Signal Process. Lett. 13 (5) (2006) 285-287.
  12. N Provos and P. Honeyman, "Hide and seek: An Introduction to Steganography", IEEE Security and Privacy, 2003, pp32-44.
  13. Donovan Artz" Digital Steganography: Hiding Data within Data ", Los Alamos National Laboratory, IEEE Trans. 2001, pp 75-80.
  14. K Suresh Babu , K B Raja, Kiran Kumar k, Manjula Devi T H, Venugopal K R, L M Pathnaik" Authentication of Secrete Information in Image Steganography", IEEE Trans. 13.
  15. Moerland, T, "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science, www. liacs. nl/home/ trnoerl/privtech. pdf.
  16. Schaefer " A Simplified Data Encryption Standard Algorithm", Cryptologia, January 1996
  17. Data Encryption Standard : http://csrc. nist. gov/publications/fips /fips 46-3 /fips- 46-3. pdf
  18. Advanced Encryption Standard http://csrc. nist. gov/publications/ fips/fips197/fips- 197. pdf
  19. Cryptography and network Security Principles and Practices, Charles Fleeger
  20. William Stallings, "Network Security Essentials (Applications and Standards)", Pearson Education, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Computer Security Network Encryption Decryption Algorithm Cryptography Symmetric Key Steganography.