Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 7 - Article 2
Year of Publication: 2010
Authors:
Ramveer Singh
Sanjive Tyagi
Awakash Mishra
Akshay Tyagi
Deo Brat Ojha
10.5120/1597-2146

Ramveer Singh, Sanjive Tyagi, Awakash Mishra, Akshay Tyagi and Deo Brat Ojha. Article:An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel. International Journal of Computer Applications 11(7):8–12, December 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Ramveer Singh and Sanjive Tyagi and Awakash Mishra and Akshay Tyagi and Deo Brat Ojha},
	title = {Article:An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {7},
	pages = {8--12},
	month = {December},
	note = {Published By Foundation of Computer Science}
}

Abstract

Today’s era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme- EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.

Reference

  • Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using Steganography Algorithm Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
  • Alain C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East Carolina University, http://www.infosecwriters.com/text_resources/pdf/steganographyDTEC6823.pdf
  • Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography, IEEE Security and Privacy, Volume 1, Issue 3 (May 2003), Pages: 32 - 44
  • Jessica Fridrich and Miroslav Goljan, Digital image steganography using stochastic modulation, Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY, 13902-6000, USA.
  • Swarnendu Mukherjee, Swarnendu Bhattacharya, Amlan Chaudhury Triple Layer Data Security ACM Ubiquity, Volume 9, Issue 17, April 29-May 5 ,2008
  • Zhao, J. In business today and tomorrow, ACM Communications of the ACM, p. 7, 1998.
  • Diego F. de Carvalho, Rafael Chies, Andre P. Freire, Luciana A. F. Martimiano and Rudinei Goularte, Video Steganography for Confidential Documents: Integrity, Privacy and Version Control , University of Sao Paulo – ICMC, Sao Carlos, SP, Brazil, State University of Maringa, Computing Department, Maringa, PR, Brazil.
  • Ramveer Singh , Awakash Mishra and D.B.Ojha “An Instinctive Approach for Secure Communication – Enhanced Data Encryption Standard (EHDES)” International journal of computer science and Information technology, Sep. 2010 Vol. 1 (4) , 2010, 264-267
  • D.B. Ojha, Ramveer Singh, Ajay Sharma, Awakash Mishra and Swati Garg “An Innovative Approach to Enhance the Security of Data Encryption Scheme” International Journal of Computer Theory and Engineering, Vol. 2,No. 3, June, 2010,1793-8201
  • Nameer N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm” Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
  • Borie J., Puech W., and Dumas M., “Crypto-Compression System for Secure Transfer of Medical Images”, 2nd International Conference on Advances in Medical Signal and Information Processing (MEDSIP 2004), September 2004.
  • N.Walkinshaw, S.Afshan, P.McMinn ”Using Compression Algorithms to Support the Comprehension of Program Traces” Proceedings of the International Workshop on Dynamic Analysis (WODA 2010) Trento, Italy, July 2010.
  • J.P.Pandey, D.B.Ojha, Ajay Sharma, “Enhance Fuzzy Commitment Scheme: An Approach for Post Quantum Cryptosystem”, in Journal of Applied and Theoretical Information Technology, (pp 16-19) Vol. 9, No. 1, Nov. 2009.
  • V.Pless, “Introduction to theory of Error Correcting Codes”, Wiley, New York 1982.
  • A.A.Al-saggaf,H.S.Acharya,“A Fuzzy Commitment Scheme”IEEE International Conference on Advances in Computer Vision and Information Technology 28-30November 2007 – India.