Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Integration of Cryptography Standards and Steganography for Secure Communication

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Navnath Gavde, Harshad Darekar, Shabnam Sharma
10.5120/ijca2018918283

Navnath Gavde, Harshad Darekar and Shabnam Sharma. Integration of Cryptography Standards and Steganography for Secure Communication. International Journal of Computer Applications 181(32):33-36, December 2018. BibTeX

@article{10.5120/ijca2018918283,
	author = {Navnath Gavde and Harshad Darekar and Shabnam Sharma},
	title = {Integration of Cryptography Standards and Steganography for Secure Communication},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2018},
	volume = {181},
	number = {32},
	month = {Dec},
	year = {2018},
	issn = {0975-8887},
	pages = {33-36},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume181/number32/30198-2018918283},
	doi = {10.5120/ijca2018918283},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Securing the massive amount of data is one of the greatest challenges and it is equally important to ensure data privacy. When the data transmitted from one computer to another, the probability of accessing the data by un-authorized user becomes high. This paper proposes a solution to enhance the security of data, using both cryptography and steganography. The key focus of this paper is to provide confidentiality of data and authentication of user. Confidentiality is achieved using RSA, a Public-key cryptography algorithm, whereas for Steganography, S-tool is used in this research work.

References

  1. Ragab-Hassen, H., & Lounes, E. (2017). A key management scheme evaluation using Markov processes. International Journal of Information Security, 16(3), 271-280.
  2. Manulis, M., Stebila, D., Kiefer, F., & Denham, N. (2016). Secure modular password authentication for the web using channel bindings. International Journal of Information Security, 15(6), 597-620.
  3. Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media.
  4. Radke, S. S., & Sambhe, V. K. (2011). Image steganography: an approach for secrete communication. In Thinkquest~ 2010(pp. 205-207). Springer, New Delhi.
  5. Aeloor, D., & Manjrekar, A. A. (2013, August). Securing Biometric Data with Visual Cryptography and Steganography. In International Symposium on Security in Computing and Communication (pp. 330-340). Springer, Berlin, Heidelberg.
  6. Chang, L., & GuangMing, X. (2012). Research and Implementation of File Encryption and Decryption. In Advances in Computer Science and Engineering (pp. 165-170). Springer, Berlin, Heidelberg
  7. Saleema, A., & Amarunnishad, T. (2016). A New Steganography Algorithm Using Hybrid Fuzzy Neural Networks. Procedia Technology, 24, 1566-1574.
  8. Salomaa, A. (2013). Public-key cryptography. Springer Science & Business Media.
  9. Priyansha Garg, Moolchand Sharma, Shivani Agrawal, Yastika Kumar - Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
  10. Roy, R., Sarkar, A., & Changder, S. (2013). Chaos based edge adaptive image steganography. Procedia Technology, 10, 138-146.
  11. Rad, A. I., Alagheband, M. R., & Far, S. B. (2018). Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols. Journal of information security and applications, 42, 87-94.
  12. Lin, C. C., & Tsai, W. H. (2004). Secret image sharing with steganography and authentication. Journal of Systems and software, 73(3), 405-414.
  13. Karampidis, K., Kavallieratou, E., & Papadourakis, G. (2018). A review of image steganalysis techniques for digital forensics. Journal of information security and applications, 40, 217-235.
  14. Ali, Z. M., & Ahmed, J. M. (2013). New computation technique for encryption and decryption based on RSA and ElGamal cryptosystems. Journal of Theoretical and Applied Information Technology, 47(1), 73-79.
  15. Bhaskar, R., Hegde, G., & Vaya, P. R. (2012). An efficient hardware model for RSA Encryption system using Vedic mathematics. Procedia Engineering, 30, 124-128.

Keywords

Authentication, Cryptography, Public Key Cryptography, RSA, Steganography