Cryptic Cover for Covered Writing: A Pre-Layered Stego

Research Article
Cryptic Cover for Covered Writing: A Pre-Layered Stego

Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Information Technology Journal, 2014, 13(16), 2524-2533.

Abstract

Brobdingnagian may be the precise word for the usage of internet and advanced expertise in the globe in our day. Indeed, all sorts of this online communication go hand in hand with the so called major apprehension, information security. Since all kinds of digital files play an imperative role in internet operation, it is indispensable to defend the key features of private communication namely, seclusion, uprightness and legitimacy. This threat, in a roundabout way, has led to the breakthrough of information security rationales. Striking among these are Cryptography and Steganography, primordial skills pursued for the sake of secret sharing. The startling thing is that with the fruition of technology, these are giving prolific outcomes even now. Cryptography possesses such a litheness that its blend, in the company of other fields of study, facilitates offer much more options to explore security issues. This study envisions an inimitable approach to security in the context of encryption and embedding incorporating shuffling, chaotic equations in conjunction with Blowfish encryption algorithm. Here, encryption is performed on images followed by embedding secret data. The latter is done not literally but indirectly. This pitch endows with randomness and security with all the persuasive traits of encryption. Validation is given in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Relative Entropy (RE), entropy and correlation values. Experimental results are illustrated to vindicate the performance of this objective.

ASCI-ID: 28-3555

Cited References Fulltext

Similar Articles


Steganography-The Art of Hiding Data

Information Technology Journal, 2004, 3(3), 245-269.

Implementation of One-Time Pad Cryptography

Information Technology Journal, 2005, 4(1), 87-95.

Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes

Information Technology Journal, 2005, 4(2), 132-139.

Theory and Implementation of Data Encryption Standard: A Review

Information Technology Journal, 2005, 4(4), 307-325.

Using Emulation Instead of Simulation to Analyze Synchronized Higher Layers Performance in Wireless Networks

Information Technology Journal, 2007, 6(7), 941-953.

Key Transformation Approach for Rijndael Security

Information Technology Journal, 2010, 9(2), 290-297.

A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol

Information Technology Journal, 2009, 8(3), 302-309.

The Subset Search Algorithm: A New Attack on the Discrete Logarithm Problem over Finite Fields and Elliptic Curves

Information Technology Journal, 2006, 5(3), 520-523.

A New Proxy Blind Signature Scheme with Message Recovery

Information Technology Journal, 2013, 12(21), 6159-6163.

Humming Bird with Coloured Wings: A Feedback Security Approach

Information Technology Journal, 2014, 13(12), 2022-2026.

A New Image Permutation Approach Using Combinational Chaotic Maps

Information Technology Journal, 2013, 12(4), 835-840.

Improvement of an Encryption Scheme for Binary Images

Information Technology Journal, 2003, 2(2), 191-200.

Image Encryption Algorithm Based on Universal Modular Transformation

Information Technology Journal, 2010, 9(4), 680-685.

An Adaptive Weighted Filter Algorithm for Mixed Noise Image

Information Technology Journal, 2013, 12(20), 5741-5745.

Time-frequency Analysis and Filtering for Pulse Shaping Signals

Information Technology Journal, 2016, 15(4), 91-98.

Image Denoising Using BM3D Combining Tetrolet Prefiltering

Information Technology Journal, 2013, 12(10), 1995-2001.

An Adaptive Weighted Filter Algorithm for Mixed Noise Image

Information Technology Journal, 2013, 12(20), 5741-5745.

Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection

Information Technology Journal, 2008, 7(3), 450-457.

High Quality Steganography Model with Attacks Detection

Information Technology Journal, 2003, 2(2), 116-127.

Proving Poverty of Steganography System

Information Technology Journal, 2005, 4(3), 284-288.

A Review on Detection of LSB Matching Steganography

Information Technology Journal, 2010, 9(8), 1725-1738.

Steganography in Ms Excel Document using Text-rotation Technique

Information Technology Journal, 2011, 10(4), 889-893.

A Secure Steganographic Method via Multiple Choice Questions

Information Technology Journal, 2011, 10(5), 992-1000.

A Huffman Coding Section-based Steganography for AAC Audio

Information Technology Journal, 2011, 10(10), 1983-1988.

Stego on 2n:1 Platform for Users and Embedding

Information Technology Journal, 2011, 10(10), 1896-1907.

Inverted Pattern in Inverted Time Domain for Icon Steganography

Information Technology Journal, 2012, 11(5), 587-595.

Steganalysis Based on Least Square Method for Multiple Least Significant Bits Steganography

Information Technology Journal, 2013, 12(6), 1233-1238.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

Purposeful Error on OFDM: A Secret Channel

Information Technology Journal, 2014, 13(12), 1985-1991.

Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Information Technology Journal, 2014, 13(12), 2047-2051.

A Client-side Fingerprinting Method for Text Document Distribution

Information Technology Journal, 2014, 13(2), 251-259.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Cover as Key and Key as Data: An Inborn Stego

Information Technology Journal, 2014, 13(12), 1969-1976.

Secret Link Through Simulink: A Stego on OFDM Channel

Information Technology Journal, 2014, 13(12), 1999-2004.

Data Puncturing in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2037-2041.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Comparative Analysis of (5/3) and Haar IWT Based Steganography

Information Technology Journal, 2014, 13(16), 2534-2543.

Steganalysis Based on Difference Statistics for LSB Matching Steganography

Information Technology Journal, 2009, 8(8), 1281-1286.

A High-capacity Steganographic Scheme for 3D Point Cloud Models

Information Technology Journal, 2010, 9(3), 412-421.

Steganography-The Art of Hiding Data

Information Technology Journal, 2004, 3(3), 245-269.

Cited By


Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey

Research Journal of Information Technology, 2017, 9(2), 46. DOI: 10.3923/rjit.2017.46.63