CFP last date
20 May 2024
Reseach Article

A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique

by Kaustab Pal, Rupayan Das, Rahul Sourav Singh, Dipta Mukherjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 11
Year of Publication: 2014
Authors: Kaustab Pal, Rupayan Das, Rahul Sourav Singh, Dipta Mukherjee
10.5120/18424-9742

Kaustab Pal, Rupayan Das, Rahul Sourav Singh, Dipta Mukherjee . A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique. International Journal of Computer Applications. 105, 11 ( November 2014), 35-37. DOI=10.5120/18424-9742

@article{ 10.5120/18424-9742,
author = { Kaustab Pal, Rupayan Das, Rahul Sourav Singh, Dipta Mukherjee },
title = { A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 11 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number11/18424-9742/ },
doi = { 10.5120/18424-9742 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:29.496727+05:30
%A Kaustab Pal
%A Rupayan Das
%A Rahul Sourav Singh
%A Dipta Mukherjee
%T A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 11
%P 35-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a hybrid approach to enhanced data security using special matrices in conjunction with Steganography. The special matrices are used for mapping the actual characters to numbers which are actually pointers to the location of the characters in the matrices. The generated numbers corresponding to each character of the message are embedded in the image pixels at the least significant bit position prior to transmission. The change of LSB values of the image pixels do not distort the image significantly, allowing for undetected transmission of any message to its intended receiver.

References
  1. William Stallings: ?Cryptography and Network Security: Principles and Practices 4th Edition, Prentice Hall.
  2. Seyed Rahman Soleimani, Masood Niazi Torshiz, "A New High Quality Vision Non-Adaptive Steganographic Method, Using Module and Combined Functions", International Journal of Emerging Trends in Signal Processing, Volume 1 ,Issue 2, January 2013
  3. A. Joseph Raphael, Dr. V Sundaram, "Cryptography and Steganography - A Survey", International Journal of Computer Technology and Applications, Volume 2 ,Issue 3, May 2011
  4. Dipta Mukherjee, Anandarup Mukherjee, Somen Nayak, "A Hybrid Stegano- Cryptographic Approach to Data Obfuscation Using LSB Technique"
  5. Moutushi Singh, Rupayan Das "Survey of Different techniques to Detect wormhole attack in wireless sensor Network" published in International Journal of Scientific & Engineering Research (IJSER), Volume 3, Issue 10, and October-2012 ISSN 2229-5518
  6. Rahul Sourav Singh,Rupayan Das, Dipta Mukherjee,Prannay Bothra , "RDR cube cipher an extension to Vignere Cipher",IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727 Volume 16,Issue 2,Ver. III(Mar-Apr. 2014),PP 64-71
  7. Anindya Shankar Shukla,Rupayan Das,Rahul Sourav Singh,Dipta Mukherjee "Bar Cipher: A Robust technique for data hiding using the concept of Barcode",Procedings of 1st International Science & Technology Congress 2014,Elsevier publication,ISBN: 9789351072485
  8. W. Bender D. Gruhl N. Morimoto A. Lu "Techniques for data hiding" IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography LSB Steganography