CFP last date
22 April 2024
Reseach Article

Security using Colors, Figures and Images

Published on January 2012 by Ajmal K. A., Dalton Dhavarev, M. Selin, V. P. Abeera
Emerging Technology Trends on Advanced Engineering Research - 2012
Foundation of Computer Science USA
ICETT - Number 3
January 2012
Authors: Ajmal K. A., Dalton Dhavarev, M. Selin, V. P. Abeera
9fdcd987-0ee9-4d19-8c0b-f955c0bb6820

Ajmal K. A., Dalton Dhavarev, M. Selin, V. P. Abeera . Security using Colors, Figures and Images. Emerging Technology Trends on Advanced Engineering Research - 2012. ICETT, 3 (January 2012), 35-39.

@article{
author = { Ajmal K. A., Dalton Dhavarev, M. Selin, V. P. Abeera },
title = { Security using Colors, Figures and Images },
journal = { Emerging Technology Trends on Advanced Engineering Research - 2012 },
issue_date = { January 2012 },
volume = { ICETT },
number = { 3 },
month = { January },
year = { 2012 },
issn = 0975-8887,
pages = { 35-39 },
numpages = 5,
url = { /proceedings/icett/number3/9847-1027/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Technology Trends on Advanced Engineering Research - 2012
%A Ajmal K. A.
%A Dalton Dhavarev
%A M. Selin
%A V. P. Abeera
%T Security using Colors, Figures and Images
%J Emerging Technology Trends on Advanced Engineering Research - 2012
%@ 0975-8887
%V ICETT
%N 3
%P 35-39
%D 2012
%I International Journal of Computer Applications
Abstract

The growth of technology in computer science and popularity of information technology among the common people changed the means of information exchange using mail services of paper messages to Email services of electronic messages. From the very beginning of the use of these types of technologies, the security offered by these techniques is a big question. Popular solutions for ensuring the security of electronic messages are cryptography and steganography. Steganography is the art of hiding the existence of the communication message before sending it to the receiver. The common techniques used are – Symmetric cryptographic algorithms and substitution steganography methods. Since these techniques are popular and common, now everybody knows how these techniques ensure the security of messages. Message hackers can now easily break these techniques because of the intense experience they might have earned by handling these types of techniques. So, there exists need for new techniques and methods to ensure the security of message. To overcome the problems associated with using the existing common and popular methods, the proposed methods use the concepts of RGB color model to hide the encrypted contents. In this method the encrypted contents are converted to a bitmap image. It has many advantages over the simple symmetric key encryption and popular LSB steganography method. The first proposed technique uses concept of color only, whereas the second method combines geometric figures with color codes to hide the message. These two methods can be considered as new techniques of generation steganography.

References
  1. Piyush Marwaha and Paresh Marwaha. 2010. "Visual cryptographic steganography in images", Second International conference on Computing, Communication and Networking Technologies.
  2. S. PavithraDeepa, S. Kannimuthu and V. Keerthika. 2011. "Security using colors and Armstrong numbers", Innovations in Emerging Technology (NCOIET), National Conference.
  3. Liu F. , Wu C. K. , Lin X. J. 2008 "Color visual cryptographic schemes", IET journals
  4. Paresh Marwaha, Piyush Marwaha and Shelly Sachdeva. 2011 "Content based Image Retrieval in Multimedia Databases", International Journal of Recent Trends in Engineering.
  5. Khalifa O. O. , Islam M. D. R. , Khan, S. , Shebani M. 2004 "Communications Cryptography", RF and Microwave Conference, 2004.
  6. Debashish Jena. 2009 "A Novel Visual Cryptography Scheme", IEEE International Conference on Advanced Computer Control.
  7. Yongzhen Zheng, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Kun Zhao. 2011. "Identification of steganography software based on core instructions template matching", IEEE Conference Publications.
  8. Huaxiong Zhang, Jie Hu, Gang Wang, Yu Zhang. 2011. "A steganography based scheme on fractal images". Second International Conference on Network and Distributed Computing.
  9. Sarreshtedari S, Ghotbi M. , Ghaemmaghami S. 2009. "One –third probability embedding: less detectable LSB steganography". IEEE International Conference on Multimedia and Expo.
  10. Chanu Y. J. , Tuithung T. , Manglem Singh K. 2012. "A short survey on image steganography and steganalysis techniques". National Conference on Emerging Trends and Applications in Computer Science.
  11. Atul Kahate, "Cryptography and Network Security", Tata McGraw Hill Publications.
  12. William Stallings, "Network Security Essentials-Applications and Standards", Pearson Education publications.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric Key Cryptography Rgb Color Model Generation Steganography