CFP last date
20 May 2024
Reseach Article

A Proposed Algorithm for Securing Signal- Encryption using Cryptography and Steganography

by Sudipto Dhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 13
Year of Publication: 2016
Authors: Sudipto Dhar
10.5120/ijca2016910872

Sudipto Dhar . A Proposed Algorithm for Securing Signal- Encryption using Cryptography and Steganography. International Journal of Computer Applications. 145, 13 ( Jul 2016), 23-26. DOI=10.5120/ijca2016910872

@article{ 10.5120/ijca2016910872,
author = { Sudipto Dhar },
title = { A Proposed Algorithm for Securing Signal- Encryption using Cryptography and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 13 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number13/25340-2016910872/ },
doi = { 10.5120/ijca2016910872 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:46.004291+05:30
%A Sudipto Dhar
%T A Proposed Algorithm for Securing Signal- Encryption using Cryptography and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 13
%P 23-26
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this era of digital transmission, security of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. For more secure communication RSA algorithm is been introduced, which is based on asymmetric key cryptography.By using Steganography methods third parties cannot percept the existence of message embedded in the audio file. The properties of the audio file remain the same after hiding the secret message. In this Paper a new-fangled substitution method (Discussed in Proposed Method section) for Steganography has been used with RSA Cryptosystem.

References
  1. R.Valarmathi, G.M.Kadhar Nawaz, “Information Hiding Using Audio Steganography with Encrypted Data”, in International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014, ISSN (Online) : 2278-1021.
  2. Arfan Shaikh, Kirankumar Solanki, Vishal Uttekar, Neeraj Vishwakarma, “ Audio Steganography And Security Using Cryptography”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 2, February 2014.
  3. Nishith Sinha, Anirban Bhowmick, B.Kishore,” Encrypted Information Hiding using Audio Steganography and Audio Cryptography”, International Journal of Computer Applications (0975 – 8887) Volume 112 No. 5, February 2015
  4. Khalil Challita and Hikmat Farhat,” Combining Steganography and Cryptography: New Directions”, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208,The Society of Digital Information and Wireless Communications, 2011 (ISSN 2220-9085).
  5. S Usha G A Sathish Kumal, K Boopathybagan,” 2011 International Conference on Computer Science and Network Technology”.
  6. Ajit Singh, Swati Malik,” International Journal of Advanced Research in Computer Science and Software Engineering”, Volume 3, Issue 5, May 2013 ISSN: 2277 128X.
  7. Meenakshiv Shankar, Akshaya.P, “Hybrid Cyptographic Technique Using RSA Algorithm And Scheduling Concepts”, in International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014.
  8. Amrita Jain, Vivek Kapoor,” Secure Communication using RSA Algorithm for Network Environment”, International Journal of Computer Applications (0975 – 8887) Volume 118 – No. 7, May 2015.
  9. Saleh Saraireh,” A Secure Data CommunicationSystem Using Cryptography And Steganography”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013.
  10. Aarti Mehndiratta,” Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 Apr-2015.
  11. Lokesh Kumar,” Novel Security Scheme for Image Steganography using Cryptography technique”, International Journal of Advanced Research in Computer Science and Software Engineering , Volume 2, Issue 4, April 2012 ISSN: 2277 128X.
  12. Md. Khalid Imam Rahmani,Kamiya Arora, Naina Pal,” A Crypto-Steganography: A Survey”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 7, 2014.
  13. Jayaram P, Ranganatha H R, Anupama H S,” Information Hiding Using Audio Steganography – A Survey”, The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011.
  14. Unik Lokhande,A.K.Gulve,”Steganography using Cryptography and Pseudo Random Numbers”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.19, June 2014.
  15. Hayfaa Abdulzahra,Robiah Ahmad, Norliza Mohd Noor ,” Combining Cryptography and SteganographyFor Data Hiding in Images”, ISBN: 978-960-474-368-1
  16. Prof. Samir Kumar Bandyopadhyay, Barnali Gupta Banik,” LSB Modification and Phase Encoding Technique of Audio Steganography Revisited”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2012, ISSN : 2278 – 1021.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography RSA Steganography Audio.