CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Crypt Arithmetic Stego based Encryption Algorithm for Secure Data Transfer

Published on December 2013 by Sudipta Sahana, Abhipsa Kundu, Ahana Pal
2nd International conference on Computing Communication and Sensor Network 2013
Foundation of Computer Science USA
CCSN2013 - Number 1
December 2013
Authors: Sudipta Sahana, Abhipsa Kundu, Ahana Pal
946fc840-66dc-4f61-a0c8-a08ba379c647

Sudipta Sahana, Abhipsa Kundu, Ahana Pal . Crypt Arithmetic Stego based Encryption Algorithm for Secure Data Transfer. 2nd International conference on Computing Communication and Sensor Network 2013. CCSN2013, 1 (December 2013), 16-22.

@article{
author = { Sudipta Sahana, Abhipsa Kundu, Ahana Pal },
title = { Crypt Arithmetic Stego based Encryption Algorithm for Secure Data Transfer },
journal = { 2nd International conference on Computing Communication and Sensor Network 2013 },
issue_date = { December 2013 },
volume = { CCSN2013 },
number = { 1 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 16-22 },
numpages = 7,
url = { /proceedings/ccsn2013/number1/14753-1306/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd International conference on Computing Communication and Sensor Network 2013
%A Sudipta Sahana
%A Abhipsa Kundu
%A Ahana Pal
%T Crypt Arithmetic Stego based Encryption Algorithm for Secure Data Transfer
%J 2nd International conference on Computing Communication and Sensor Network 2013
%@ 0975-8887
%V CCSN2013
%N 1
%P 16-22
%D 2013
%I International Journal of Computer Applications
Abstract

Information security is the most important issues in network communication in current days. Safe and sound data transfer become more essential and significant, as security is a major concern in the field of message transformation over internet in current years, Cryptography and Steganography are two significant areas of research that involve a number of applications. Cryptography is the technology that involves converting a message text into an unreadable cipher. Steganography is an art of hiding information in a cover image without causing statistically significant change to the cover image, so a carrier is needed to transfer information. In this proposed work the plain text is transformed to a cipher text using Cryptography technique where after changing the original text into its equivalent binary bits generally different kind of Boolean algebraic operations are used and in the succeeding step using Steganography technique this cipher text is hidden inside a gray scale image as a cover media with dimension 2m x 2m and a secure pictorial block steganography based encryptionalgorithm is proposed to execute the concept of secrecy for transferring text messagesbefore transmitting the information and also mentioned the Cryptanalysis and Steganalysis method for retrieving data at receiver side. The experimental result shows that the algorithm hasa high capacity and is better than the previous recommended PBST [5] techniqueFurthermore, satisfactory security is maintainedsince the secret message that is hidden inside the image cannot be extracted withoutknowing the cryptanalysis technique.

References
  1. MihirBellare and SriramKeelveedhi and Thomas Ristenpart," Message-Locked Encryption and Secure Deduplication", Eurocrypt 2013, Volume 7881, 2013, pp 296-312
  2. Siddhartha Malik, Anjali Sardana, "A Keyless Approach to Image Encryption", IEEE, International Conference on Communication Systems and Network Technologies 2012.
  3. KirtikaSingla and sumeetkar, "Hash Based Approach For Secure Image Steganography Using Canny Edge Detection Method", ISSN-0973-7391, Vol. 3, Number 1, January-June 2012, pp. 155-157.
  4. Rongyue Zhang," AN EFFICIENT EMBEDDER FOR BCH CODING FOR STEGANOGRAPHY" Information Theory, IEEE Transactions on vol. 58, December 2012.
  5. AnupamMondal, SudiptaSahana, Sainik Kumar Mahata "A Pictorial Block Steganography based Secure Algorithm for Data Transfer" International Conference on Computing, Communication and Sensor Network (CCSN) 2012
  6. PiyushMarwaha, PareshMarwaha, "Visual Cryptographic Steganography in images", 2nd International Conference on Computing, Communication and Networking Technologies, 2010
  7. Adel Almohammad and GheorghitaGhinea, "Image Steganography and Chrominance components ", 10th IEEE International Conference on Computer and information Technology, 2010
  8. Quinhua Huang and WeiminOugang, "Protect fragile regions in Steganography LSB Embedding", 3rd International Symposium on Knowledge Acquisition and Modeling, 2010.
  9. L. Ji, W. Jiang, B. Dai and X. Niu, "A Novel Covert Channel Based on Length of Messages", International Symposium on Information Engineering and Electronic Commerce,16-17 May 2009, Page(s):551-554.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Plaintext Ciphertext Cryptanalysis Steganalysis