CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Optimized Block Steganography based Crypt Encryption for Secured Data Transfer

Published on December 2013 by Sudipta Sahana, Akash Pal, Archisman Chakroborty
2nd International conference on Computing Communication and Sensor Network 2013
Foundation of Computer Science USA
CCSN2013 - Number 1
December 2013
Authors: Sudipta Sahana, Akash Pal, Archisman Chakroborty
8122fc87-57c7-48ce-8fd9-a5af9fb6d321

Sudipta Sahana, Akash Pal, Archisman Chakroborty . Optimized Block Steganography based Crypt Encryption for Secured Data Transfer. 2nd International conference on Computing Communication and Sensor Network 2013. CCSN2013, 1 (December 2013), 29-34.

@article{
author = { Sudipta Sahana, Akash Pal, Archisman Chakroborty },
title = { Optimized Block Steganography based Crypt Encryption for Secured Data Transfer },
journal = { 2nd International conference on Computing Communication and Sensor Network 2013 },
issue_date = { December 2013 },
volume = { CCSN2013 },
number = { 1 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 29-34 },
numpages = 6,
url = { /proceedings/ccsn2013/number1/14755-1308/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd International conference on Computing Communication and Sensor Network 2013
%A Sudipta Sahana
%A Akash Pal
%A Archisman Chakroborty
%T Optimized Block Steganography based Crypt Encryption for Secured Data Transfer
%J 2nd International conference on Computing Communication and Sensor Network 2013
%@ 0975-8887
%V CCSN2013
%N 1
%P 29-34
%D 2013
%I International Journal of Computer Applications
Abstract

In this paper a new steganographic technique using an advanced cryptographic technique has been proposed. In the encryption part of this paper the concept of ASCII value of the English alphabets have been used. Besides this the binary conversion of those ASCII values and the concept of hamming distance measurement are also used here. Multiple Auxiliary keys are generated using one password and after the encryption, the steganographic part is done with the help of grey-scale concept.

References
  1. Yicong Zhou, Sos Agaian, "Image Encryption Using the Image Steganography Concept and PLIP Model" International Conference on System Science and Engineering, Macau, China - June 2011
  2. K. Pramitha, Dr. L. Padma Suresh, K. L. Shunmuganathan "Image Steganography using MOD-4 embedding algorithm based on imagecontrast" International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011)
  3. Ge Huayong, Huang Mingsheng, Wang Qian "Steganography and Steganalysis Based on Digital Image" 2011 4th International Congress on Image and Signal Processing
  4. S. M. Masud Karim, Md. Saifur Rahman, Md. Ismail Hossain "A New Approach for LSB Based Image Steganography using Secret Key", International Conference on Computer and Information Technology (ICCIT 2011) 22-24 December, 2011, Dhaka, Bangladesh
  5. Lauretha Rura, Biju Issac, Manas Kumar Haldar "Analysis of Image Steganography Techniques in Secure Online Voting", 20 II International Conference on Computer Science and Network Technology
  6. RigDas , Themrichon Tuithung "A Novel Steganography Method for Image Based on Huffman Encoding", 2012 IEEE
  7. G. Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan ,"Steganography Using Edge Adaptive Image", 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET]
  8. Yam bern Jina Chanu, ThemrichonTuithung, Kh. Manglem Singh," A Short Survey on Image Steganography and Steganalysis Techniques", 2012 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Cover Image Data Hiding Cryptography Steganography Stego-image Grayscale Image Definition Hamming Distance.