CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform

by Madhusmita Sahu, Soumya Ranjan Pradhan, Madhusmita Das
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 5
Year of Publication: 2013
Authors: Madhusmita Sahu, Soumya Ranjan Pradhan, Madhusmita Das
10.5120/11961-7801

Madhusmita Sahu, Soumya Ranjan Pradhan, Madhusmita Das . Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications. 70, 5 ( May 2013), 36-41. DOI=10.5120/11961-7801

@article{ 10.5120/11961-7801,
author = { Madhusmita Sahu, Soumya Ranjan Pradhan, Madhusmita Das },
title = { Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 5 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number5/11961-7801/ },
doi = { 10.5120/11961-7801 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:06.057774+05:30
%A Madhusmita Sahu
%A Soumya Ranjan Pradhan
%A Madhusmita Das
%T Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 5
%P 36-41
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid growth of communication/transaction over internet and continuous efforts by eavesdroppers or Cyber attackers, there is a continuous need for new strong alternative algorithm. Techniques for information hiding are becoming increasingly more sophisticated and widespread. The primary goal, for designing such algorithms, is to provide security. However, performance and implementation ease and execution time are other factors that make an algorithm more usable. An improved encryption model, which is an extension of an existing algorithm based on Unicode and colours map can be used & Steganography using indiscrete wavelet transform (HCSSD) is proposed. The cipher text generated by this method can be varying in size as the plaintext and will suitable for practical use in the secure transmission of confidential information over the internet.

References
  1. I Venkata Sai Manoj," Cryptography" AND Steganography" International Journal of Computer Applications, (0975-8887) Volume 1-No. 12©2010.
  2. Maram Balajee" Unicode & Color Integration Tool for Encryption & Decryption"International Journal on Computer Science and Engineering (IJCSE), ISSN: 0975, Vol. 3No. 3, Mar 2011.
  3. H S Majunatha Reddy, & K B Raja "High Capacity and Security Steganography Using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Volume (3), Issue (6).
  4. William stallings, ?Cryptography and Network Security: Principles & Practices?, second edition.
  5. Luis von Ahn, Nicholas J. Hopper. , Public-Key Steganography.
  6. Li Dongjiang, Wang Yandan, Chen Hong," The research on key generation in RSA public- key cryptosystem", Fourth International Conference on Computational and Information Sciences DOI 10. 1109/ICCIS. 348 2012.
  7. Web reference: http://www. unicode. org [As accessed on: 02-November- 2012]
  8. Misako Suwa," Color-Mixing Correction of Overlapped Colours in Scanner Images, "International Conference on Document Analysis and Recognition 1520-5363/11 $26. 00 IEEE DOI10. 1109/ICDAR. 2011. 52 © 2011.
  9. Web reference: http://cloford. com/resources/colours/500col. htm [As accessed on: 02-December-2012].
  10. Web reference: http://processing. org [As accessed on: 29-December- 2012].
  11. Sujay Narayan and Gaurav Prasad," Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions "Signal and Image Processing, An International Journal(SIPIJ),Vol. 1,No. 2,Dec 2010.
  12. Lisa M. Marvel and Charles T. Retter, "A Methodology for Data Hiding using Images," IEEE conference on Military communication, vol. 3, Issue. 18-21, pp. 1044-1047, 1998.
  13. LIU Tong, QIU Zheng-ding "A DWT-based colour Images Steganography Scheme" IEEE International Conference on Signal Processing, vol. 2, pp. 1568-1571, 2002.
  14. Jessica Fridrich, Miroslav Goijan and David Soukal, "Higher-order statistical steganalysis of palette images" Proceeding of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 5020, pp. 178-190, 2003.
  15. Nameer N. EL-Emam,"Hiding a Large Amount of Data with High Security Using Steganography Algorithm, "Journal of Computer Science, ISSN 1549-3636 Vol. 3 (4): 223-232, 2007.
  16. J. K. Mandal and Debashis Das," Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain", International Journal of Information Sciences and Techniques (IJIST), Vol. 2, No. 4, July 2012.
  17. Aamar Nadeem and M Y Javed "A Performance Comparsion of data encryption algorithim,"IEEE Information and Communication Technologies, 2005 IEEE DOI 10. 1109/ICICT. 2005. 1598 556.
  18. Neil F. Johnson and Sushi1 Jajodia Steganalysis,"The Investigation of Hidden Information," IEEE -7803-9914-5/98/$10. 00 1998.
  19. Chi-Kwong Chan, L. M. Cheng,"Hiding data in images by simple LSB substitution,"Pattern Recognition Society. Published by Elsevier Ltd. , doi:10. 1016/j. patcog. 2003.
  20. Yan Wang and Ming Hu"Timing evaluation of the known Cryptographic algorithm", International Conferences on Computational Intelligence and Security 978-0-7695-7/09 $26. 00©2009 IEEE DOI 10. 1109/CIS. 2009. 81
Index Terms

Computer Science
Information Sciences

Keywords

Public key Crypto system Unicode Stego Image Wavelet Fusion