CFP last date
22 April 2024
Reseach Article

Integration of Cryptography Standards and Steganography for Secure Communication

by Navnath Gavde, Harshad Darekar, Shabnam Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 32
Year of Publication: 2018
Authors: Navnath Gavde, Harshad Darekar, Shabnam Sharma
10.5120/ijca2018918283

Navnath Gavde, Harshad Darekar, Shabnam Sharma . Integration of Cryptography Standards and Steganography for Secure Communication. International Journal of Computer Applications. 181, 32 ( Dec 2018), 33-36. DOI=10.5120/ijca2018918283

@article{ 10.5120/ijca2018918283,
author = { Navnath Gavde, Harshad Darekar, Shabnam Sharma },
title = { Integration of Cryptography Standards and Steganography for Secure Communication },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2018 },
volume = { 181 },
number = { 32 },
month = { Dec },
year = { 2018 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number32/30198-2018918283/ },
doi = { 10.5120/ijca2018918283 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:07:57.448321+05:30
%A Navnath Gavde
%A Harshad Darekar
%A Shabnam Sharma
%T Integration of Cryptography Standards and Steganography for Secure Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 32
%P 33-36
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing the massive amount of data is one of the greatest challenges and it is equally important to ensure data privacy. When the data transmitted from one computer to another, the probability of accessing the data by un-authorized user becomes high. This paper proposes a solution to enhance the security of data, using both cryptography and steganography. The key focus of this paper is to provide confidentiality of data and authentication of user. Confidentiality is achieved using RSA, a Public-key cryptography algorithm, whereas for Steganography, S-tool is used in this research work.

References
  1. Ragab-Hassen, H., & Lounes, E. (2017). A key management scheme evaluation using Markov processes. International Journal of Information Security, 16(3), 271-280.
  2. Manulis, M., Stebila, D., Kiefer, F., & Denham, N. (2016). Secure modular password authentication for the web using channel bindings. International Journal of Information Security, 15(6), 597-620.
  3. Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media.
  4. Radke, S. S., & Sambhe, V. K. (2011). Image steganography: an approach for secrete communication. In Thinkquest~ 2010(pp. 205-207). Springer, New Delhi.
  5. Aeloor, D., & Manjrekar, A. A. (2013, August). Securing Biometric Data with Visual Cryptography and Steganography. In International Symposium on Security in Computing and Communication (pp. 330-340). Springer, Berlin, Heidelberg.
  6. Chang, L., & GuangMing, X. (2012). Research and Implementation of File Encryption and Decryption. In Advances in Computer Science and Engineering (pp. 165-170). Springer, Berlin, Heidelberg
  7. Saleema, A., & Amarunnishad, T. (2016). A New Steganography Algorithm Using Hybrid Fuzzy Neural Networks. Procedia Technology, 24, 1566-1574.
  8. Salomaa, A. (2013). Public-key cryptography. Springer Science & Business Media.
  9. Priyansha Garg, Moolchand Sharma, Shivani Agrawal, Yastika Kumar - Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
  10. Roy, R., Sarkar, A., & Changder, S. (2013). Chaos based edge adaptive image steganography. Procedia Technology, 10, 138-146.
  11. Rad, A. I., Alagheband, M. R., & Far, S. B. (2018). Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols. Journal of information security and applications, 42, 87-94.
  12. Lin, C. C., & Tsai, W. H. (2004). Secret image sharing with steganography and authentication. Journal of Systems and software, 73(3), 405-414.
  13. Karampidis, K., Kavallieratou, E., & Papadourakis, G. (2018). A review of image steganalysis techniques for digital forensics. Journal of information security and applications, 40, 217-235.
  14. Ali, Z. M., & Ahmed, J. M. (2013). New computation technique for encryption and decryption based on RSA and ElGamal cryptosystems. Journal of Theoretical and Applied Information Technology, 47(1), 73-79.
  15. Bhaskar, R., Hegde, G., & Vaya, P. R. (2012). An efficient hardware model for RSA Encryption system using Vedic mathematics. Procedia Engineering, 30, 124-128.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Cryptography Public Key Cryptography RSA Steganography