CFP last date
20 May 2024
Reseach Article

Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms

by Victor Onomza Waziri, Idris Suleiman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 16
Year of Publication: 2015
Authors: Victor Onomza Waziri, Idris Suleiman
10.5120/19749-1546

Victor Onomza Waziri, Idris Suleiman . Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms. International Journal of Computer Applications. 112, 16 ( February 2015), 10-14. DOI=10.5120/19749-1546

@article{ 10.5120/19749-1546,
author = { Victor Onomza Waziri, Idris Suleiman },
title = { Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 16 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number16/19749-1546/ },
doi = { 10.5120/19749-1546 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:37.901624+05:30
%A Victor Onomza Waziri
%A Idris Suleiman
%T Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 16
%P 10-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The introduction of Internet has made it easier for everyone to access almost all information from different locations globally. This has made sensitive information prone to attack by malicious attackers. It therefore becomes important to come with measures that can be used to protect data on transmission from falling into wrong hands and to deliver some crucial messages surreptitiously especially at this age of political and religious cyber terrorism. In this paper, we propose a method of combining the features of cryptography and steganography to provide security to data in the Internet. We employ the techniques of vigenere cipher to scramble the message and then embed the encrypted message using the least significant bit method. The method provides confidentiality to information disseminations with the assumption that the adversary does not have the decrypting oracle mechanism.

References
  1. Ayushi (2010). A Symmetric Key Cryptographic Algorithm. International Journal of Computer Applications, 1(15), 1-4
  2. Jayaram, P. , Ranganatha, H. R. , Anupama, H. S. (2011). Information Hiding Using Audio Steganography – A Survey. The International Journal of Multimedia & Its Applications,3(3), 86-96
  3. Kannaki, S. V. , Porkodi, K. P. , Ananthi M. (2013). Secure Data Hiding Using An Integration Of Cryptography And Steganography. Research Journal of Computer Systems Engineering,4, 558-563. Retrieved from: http://technicaljournals. org/RJCSE/
  4. Mamta Juneja and Parvinder S. Sandhu (2013). An Improved LSB Based Steganography Technique for RGB Color Images. International Journal of Computer and Communication Engineering, 2(4), 513-517
  5. Obaida, M. A. A. (2013). A New Approach for Complex Encrypting and Decrypting Data. International Journal of Computer Networks & Communications, 5(2), 95-103
  6. Phad, V. S. , Bhosale, R. S. , Panhalkar, A. R. (2012). A Novel Security Scheme for Secret Data using Cryptography and Steganography. I. J. Computer Network and Information Security, 2, 36-42 DOI: 10. 5815/ijcnis. 2012. 02. 06
  7. Payal, G. , Ravimohan, and Sumit, S. (2013). A New Secure Encryption Algorithm Using Combination of Cryptography and Steganography. International Journal of software & Hardware Research in Engineering, 1(1), 73-76
  8. Saleh, S. (2013). A Secure Data Communication System Using Cryptography and Steganography. International Journal of Computer Networks & Communications, 5(3), 125-137
  9. Sarabjeet, K. and Sonika, J. (2013). Image Steganography using Hybrid Edge Detection and First Component Alteration Technique. International Journal of Hybrid Information Technology,6(5), 51-66
  10. Sumit, K. , and Amit, K. (2012). Advanced Network Security Using Cryptography And Steganography. Journal of Global Research in Electronics and Communication, 1(1), 1-5,
Index Terms

Computer Science
Information Sciences

Keywords

Stegnography Vigenere Cipher Confidentiality Encrypted Message Malicious Atackers