Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Development of a Novel Algorithm to Provide Efficiency and Security

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Shriya Pandey, Anshul Sarawagi
10.5120/ijca2016910157

Shriya Pandey and Anshul Sarawagi. Development of a Novel Algorithm to Provide Efficiency and Security. International Journal of Computer Applications 143(4):37-41, June 2016. BibTeX

@article{10.5120/ijca2016910157,
	author = {Shriya Pandey and Anshul Sarawagi},
	title = {Development of a Novel Algorithm to Provide Efficiency and Security},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {143},
	number = {4},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {37-41},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume143/number4/25069-2016910157},
	doi = {10.5120/ijca2016910157},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

To achieve high security, steganography process is combined with cryptographic encryption decryption algorithm such that if any one detect the presence of secret information still it is not understandable. Also there are many encryption/ decryption and steganography algorithm but there is always a competition to develop such an algorithm which is not only fast but also secure too. The proposed architecture first encrypts the secret text with proposed encryption algorithm and then hides it behind another text file through steganography algorithm.

References

  1. Rishav Ray, Jeeyan Sanyal, Debanjan Das, Asoke Nath.“A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file: RJDA Algorithm”. 2012 IEEE International Conference on Communication Systems and Network Technologies
  2. Clair, Bryan. “Steganography: How to Send a Secret Message.” 8 Nov. 2001.
  3. Westfeld, A., and G. Wolf, Steganography in a Video conferencing system, in proceedings of the second international workshop on information hiding, vol. 1525 of lecture notes in computer science, Springer, 1998.pp. 32-47.
  4. Johnson, N. F. and Jajodia, S, “Exploring steganography: Seeing the unseen”, IEEE Computer Magazine, pp. 26-34, February 1998.
  5. William Stallings, Cryptography and Network Security, Principles and Practice, Third edition, Pearson Education, Singapore, 2003.
  6. Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: “Proceedings of International conference on security and management(SAM'10” held at Las Vegas, USA Jul 12-15, 2010), P-Vol-2, 239-244(2010).
  7. An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Choudhary, Asoke Nath: Communicated for publication in IEEE International conference WICT 2011 to be held at Mumbai Dec 11-14, 2011.
  8. Data Hiding and Retrieval: Asoke Nath, Sankar Das, Amlan Chakraborty, published in IEEE “Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN 2010)”  held from 26-28 NOV' 2010 at Bhopal.
  9. Advanced Steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2, LSB+3 bits in non standard cover files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications, Vol- 14, No. 7, Page-31-35, Feb (2011).
  10. Advanced Steganography Algorithm using encrypted secret message: Joyshree Nath and Asoke Nath, International Journal of Computer Science and Applications, Vol-2, No. 3, Page- 19-24, Mar (2010).
  11. A Challenge in hiding encrypted message in LSB and LSB+1 bit positions in any cover files: executable files, Microsoft Office files and database files, image files, audio and video files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath : JGRCS, Vol-2, No. 4, Page- 180-185, Apr (2011).
  12. New Data Hiding Algorithm in MATLAB using Encrypted secret message: Agniswar Dutta, Abhirup Kumar Sen, Sankar Das, Shalabh Agarwal and Asoke Nath : Proceedings of IEEE CSNT- 2011 held at SMVDU (Jammu), 03-06 Jun, 2011, Page 262-267.
  13. New Steganography algorithm using encrypted secret message: Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh and Asoke Nath : Proceedings of Worldcomp 2011 held at Las Vegas (USA), 18-21 Jul, 2011.
  14. Steganography In Digital Media: Principles, Algorithms and Applications by Jessica Fridrich : Cambridge University Press.
  15. Cryptography and Network Security, William Stallings, Prentice Hall of India.
  16. Cryptography & Network Security, Behrouz A. Forouzan, Tata McGraw Hill Book Company.
  17. Cryptography and Information Security, V. K. Pachghare, Prentice Hall of India.
  18. SANS Security Essentials, (volume 1.4, chapter 4) Encryption and Exploits, 2001.
  19. Petitcolas, Fabien A.P., “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000.
  20. StegoArchive, “Steganography Information, Software and News to enhance your Privacy”, 2001
  21. Petitcolas, Fabien A.P., “The Information Hiding Homepage: Digital Watermarking and Steganography”
  22. Johnson, Neil F., “Steganography”, 2000.
  23. The WEPIN Store, “Steganography (Hidden Writing)”, 1995
  24. Sellars, D., “An Introduction to Steganography”
  25. Bender, W., “Techniques for Data Hiding”, IBM Systems Journal, Vol. 35, Nos 3+4, Pgs 313-336, 1996.
  26. Krinn, J., “Introduction to Steganography”, 2000
  27. Noto, M., “MP3Stego: Hiding Text in MP3 files”, 2001
  28. “Chameleon”, Image Steganography by Mark David Gan
  29. Translation-Based Steganography: Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail Atallah
  30. Hide and Seek: An introduction to Steganography: Niels Provos, Peter Honeyman.
  31. Modren Steganography: Miroslav Dobší_ek

Keywords

Computer Security, Steganography, RJDA Algorithm, Encryption Decryption Algorithm, Network , Cryptography, Symmetric Key.