CFP last date
22 April 2024
Reseach Article

Article:An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel

by Ramveer Singh, Sanjive Tyagi, Awakash Mishra, Akshay Tyagi, Deo Brat Ojha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 7
Year of Publication: 2010
Authors: Ramveer Singh, Sanjive Tyagi, Awakash Mishra, Akshay Tyagi, Deo Brat Ojha
10.5120/1597-2146

Ramveer Singh, Sanjive Tyagi, Awakash Mishra, Akshay Tyagi, Deo Brat Ojha . Article:An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel. International Journal of Computer Applications. 11, 7 ( December 2010), 8-12. DOI=10.5120/1597-2146

@article{ 10.5120/1597-2146,
author = { Ramveer Singh, Sanjive Tyagi, Awakash Mishra, Akshay Tyagi, Deo Brat Ojha },
title = { Article:An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 7 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number7/1597-2146/ },
doi = { 10.5120/1597-2146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:59:54.604338+05:30
%A Ramveer Singh
%A Sanjive Tyagi
%A Awakash Mishra
%A Akshay Tyagi
%A Deo Brat Ojha
%T Article:An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 7
%P 8-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today’s era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme- EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.

References
  1. Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using Steganography Algorithm Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
  2. Alain C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East Carolina University, http://www.infosecwriters.com/text_resources/pdf/steganographyDTEC6823.pdf
  3. Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography, IEEE Security and Privacy, Volume 1, Issue 3 (May 2003), Pages: 32 - 44
  4. Jessica Fridrich and Miroslav Goljan, Digital image steganography using stochastic modulation, Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY, 13902-6000, USA.
  5. Swarnendu Mukherjee, Swarnendu Bhattacharya, Amlan Chaudhury Triple Layer Data Security ACM Ubiquity, Volume 9, Issue 17, April 29-May 5 ,2008
  6. Zhao, J. In business today and tomorrow, ACM Communications of the ACM, p. 7, 1998.
  7. Diego F. de Carvalho, Rafael Chies, Andre P. Freire, Luciana A. F. Martimiano and Rudinei Goularte, Video Steganography for Confidential Documents: Integrity, Privacy and Version Control , University of Sao Paulo – ICMC, Sao Carlos, SP, Brazil, State University of Maringa, Computing Department, Maringa, PR, Brazil.
  8. Ramveer Singh , Awakash Mishra and D.B.Ojha “An Instinctive Approach for Secure Communication – Enhanced Data Encryption Standard (EHDES)” International journal of computer science and Information technology, Sep. 2010 Vol. 1 (4) , 2010, 264-267
  9. D.B. Ojha, Ramveer Singh, Ajay Sharma, Awakash Mishra and Swati Garg “An Innovative Approach to Enhance the Security of Data Encryption Scheme” International Journal of Computer Theory and Engineering, Vol. 2,No. 3, June, 2010,1793-8201
  10. Nameer N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm” Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
  11. Borie J., Puech W., and Dumas M., “Crypto-Compression System for Secure Transfer of Medical Images”, 2nd International Conference on Advances in Medical Signal and Information Processing (MEDSIP 2004), September 2004.
  12. N.Walkinshaw, S.Afshan, P.McMinn ”Using Compression Algorithms to Support the Comprehension of Program Traces” Proceedings of the International Workshop on Dynamic Analysis (WODA 2010) Trento, Italy, July 2010.
  13. J.P.Pandey, D.B.Ojha, Ajay Sharma, “Enhance Fuzzy Commitment Scheme: An Approach for Post Quantum Cryptosystem”, in Journal of Applied and Theoretical Information Technology, (pp 16-19) Vol. 9, No. 1, Nov. 2009.
  14. V.Pless, “Introduction to theory of Error Correcting Codes”, Wiley, New York 1982.
  15. A.A.Al-saggaf,H.S.Acharya,“A Fuzzy Commitment Scheme”IEEE International Conference on Advances in Computer Vision and Information Technology 28-30November 2007 – India.
Index Terms

Computer Science
Information Sciences

Keywords

EHDES Cryptography Stegnography Compression Image File Error Correction Code