Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
Information Technology Journal, 2014, 13(16), 2524-2533.
Brobdingnagian may be the precise word for the usage of internet and advanced expertise in the globe in our day. Indeed, all sorts of this online communication go hand in hand with the so called major apprehension, information security. Since all kinds of digital files play an imperative role in internet operation, it is indispensable to defend the key features of private communication namely, seclusion, uprightness and legitimacy. This threat, in a roundabout way, has led to the breakthrough of information security rationales. Striking among these are Cryptography and Steganography, primordial skills pursued for the sake of secret sharing. The startling thing is that with the fruition of technology, these are giving prolific outcomes even now. Cryptography possesses such a litheness that its blend, in the company of other fields of study, facilitates offer much more options to explore security issues. This study envisions an inimitable approach to security in the context of encryption and embedding incorporating shuffling, chaotic equations in conjunction with Blowfish encryption algorithm. Here, encryption is performed on images followed by embedding secret data. The latter is done not literally but indirectly. This pitch endows with randomness and security with all the persuasive traits of encryption. Validation is given in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Relative Entropy (RE), entropy and correlation values. Experimental results are illustrated to vindicate the performance of this objective.
ASCI-ID: 28-3555
Information Technology Journal, 2004, 3(3), 245-269.
Implementation of One-Time Pad CryptographyInformation Technology Journal, 2005, 4(1), 87-95.
Implementation of Elliptic Curve Diffie-Hellman and EC Encryption SchemesInformation Technology Journal, 2005, 4(2), 132-139.
Theory and Implementation of Data Encryption Standard: A ReviewInformation Technology Journal, 2005, 4(4), 307-325.
Using Emulation Instead of Simulation to Analyze Synchronized Higher Layers Performance in Wireless NetworksInformation Technology Journal, 2007, 6(7), 941-953.
Key Transformation Approach for Rijndael SecurityInformation Technology Journal, 2010, 9(2), 290-297.
A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting ProtocolInformation Technology Journal, 2009, 8(3), 302-309.
The Subset Search Algorithm: A New Attack on the Discrete Logarithm Problem over Finite Fields and Elliptic CurvesInformation Technology Journal, 2006, 5(3), 520-523.
A New Proxy Blind Signature Scheme with Message RecoveryInformation Technology Journal, 2013, 12(21), 6159-6163.
Humming Bird with Coloured Wings: A Feedback Security ApproachInformation Technology Journal, 2014, 13(12), 2022-2026.
A New Image Permutation Approach Using Combinational Chaotic MapsInformation Technology Journal, 2013, 12(4), 835-840.
Improvement of an Encryption Scheme for Binary ImagesInformation Technology Journal, 2003, 2(2), 191-200.
Image Encryption Algorithm Based on Universal Modular TransformationInformation Technology Journal, 2010, 9(4), 680-685.
An Adaptive Weighted Filter Algorithm for Mixed Noise ImageInformation Technology Journal, 2013, 12(20), 5741-5745.
Time-frequency Analysis and Filtering for Pulse Shaping SignalsInformation Technology Journal, 2016, 15(4), 91-98.
Image Denoising Using BM3D Combining Tetrolet PrefilteringInformation Technology Journal, 2013, 12(10), 1995-2001.
An Adaptive Weighted Filter Algorithm for Mixed Noise ImageInformation Technology Journal, 2013, 12(20), 5741-5745.
Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path SelectionInformation Technology Journal, 2008, 7(3), 450-457.
High Quality Steganography Model with Attacks DetectionInformation Technology Journal, 2003, 2(2), 116-127.
Proving Poverty of Steganography SystemInformation Technology Journal, 2005, 4(3), 284-288.
A Review on Detection of LSB Matching SteganographyInformation Technology Journal, 2010, 9(8), 1725-1738.
Steganography in Ms Excel Document using Text-rotation TechniqueInformation Technology Journal, 2011, 10(4), 889-893.
A Secure Steganographic Method via Multiple Choice QuestionsInformation Technology Journal, 2011, 10(5), 992-1000.
A Huffman Coding Section-based Steganography for AAC AudioInformation Technology Journal, 2011, 10(10), 1983-1988.
Stego on 2n:1 Platform for Users and EmbeddingInformation Technology Journal, 2011, 10(10), 1896-1907.
Inverted Pattern in Inverted Time Domain for Icon SteganographyInformation Technology Journal, 2012, 11(5), 587-595.
Steganalysis Based on Least Square Method for Multiple Least Significant Bits SteganographyInformation Technology Journal, 2013, 12(6), 1233-1238.
Reversible Steganography on OFDM Channel-A Role of RS CodingInformation Technology Journal, 2014, 13(12), 2052-2056.
Purposeful Error on OFDM: A Secret ChannelInformation Technology Journal, 2014, 13(12), 1985-1991.
Reversible Steganography on OFDM Channel: A Role of Cyclic CodesInformation Technology Journal, 2014, 13(12), 2047-2051.
A Client-side Fingerprinting Method for Text Document DistributionInformation Technology Journal, 2014, 13(2), 251-259.
Stego in Multicarrier: A Phase Hidden CommunicationInformation Technology Journal, 2014, 13(12), 2011-2016.
Spread and Hide-A Stego TransceiverInformation Technology Journal, 2014, 13(12), 2061-2064.
Cover as Key and Key as Data: An Inborn StegoInformation Technology Journal, 2014, 13(12), 1969-1976.
Secret Link Through Simulink: A Stego on OFDM ChannelInformation Technology Journal, 2014, 13(12), 1999-2004.
Data Puncturing in OFDM Channel: A Multicarrier StegoInformation Technology Journal, 2014, 13(12), 2037-2041.
Inserted Embedding in OFDM Channel: A Multicarrier StegoInformation Technology Journal, 2014, 13(12), 2017-2021.
Comparative Analysis of (5/3) and Haar IWT Based SteganographyInformation Technology Journal, 2014, 13(16), 2534-2543.
Steganalysis Based on Difference Statistics for LSB Matching SteganographyInformation Technology Journal, 2009, 8(8), 1281-1286.
A High-capacity Steganographic Scheme for 3D Point Cloud ModelsInformation Technology Journal, 2010, 9(3), 412-421.
Steganography-The Art of Hiding DataInformation Technology Journal, 2004, 3(3), 245-269.
Research Journal of Information Technology, 2017, 9(2), 46. DOI: 10.3923/rjit.2017.46.63