CFP last date
20 January 2025
Reseach Article

Secure Data Hiding using Elliptical Curve Cryptography and Steganography

by Hemanta Kumar Mohanta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 3
Year of Publication: 2014
Authors: Hemanta Kumar Mohanta
10.5120/18890-0172

Hemanta Kumar Mohanta . Secure Data Hiding using Elliptical Curve Cryptography and Steganography. International Journal of Computer Applications. 108, 3 ( December 2014), 16-20. DOI=10.5120/18890-0172

@article{ 10.5120/18890-0172,
author = { Hemanta Kumar Mohanta },
title = { Secure Data Hiding using Elliptical Curve Cryptography and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 3 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number3/18890-0172/ },
doi = { 10.5120/18890-0172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:42:01.870740+05:30
%A Hemanta Kumar Mohanta
%T Secure Data Hiding using Elliptical Curve Cryptography and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 3
%P 16-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now these days information are passing by internet. Hence the security of information has become a fundamental issue. Cryptography is the well-known technique to secure data over network. Steganography is the technique to hide the message in digital media. The elliptical curve cryptography is more secure than the existing cryptography models. This paper describes a proposed hybrid model using public key Elliptical Curve Cryptography (ECC) and Steganography. Which provide more security than a Single ECC or Steganography methods. The main aim of this project is to hide crucial information of internet users, military, different corporate sectors those which are frequently using public network for communication.

References
  1. M. M Amin, M. Salleh, S . Ibrahim, M. R. K atmin, and M. Z. I. Shamsuddin, Information Hiding using Steganography, National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, 2003 IEEE.
  2. S Ushll , G A SathishKumal, K Boopathybagan,A Secure Triple Level Encryption Method Using Cryptography and Steganography, 20 II International Conference on Computer Science and Network Technology, 978-1-4577-1587-7/111$26. 00 ©20111EEE, December 24-26, 2011
  3. X. Zhang and S. Wang, Steganography using multiple-base notational system and human vision sensitivity, IEEE Signal Process. Lett. , vol. 12, no. I, pp. 67-70, Jan. 2005.
  4. BehrouzA. Forouan, Debdeep Mukhopadhyay, 2nd edition Cryptography and network security, McGraw Hill Education, pp. 295-296
  5. S. M. Masud Karim, Md. Saifur Rahman, Md. Ismail Hossain, A New Approach for LSB Based Image Steganographyusing Secret Key987-161284-908-9/11/$26. 00 2011 IEEE
  6. M. Hossain, S. A. Haque, F. Sharmin, Variable RateSteganography in Gray Scale Digital Images Using Neighborhood Pixel Information, Proceedings of 200912th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December 2009, Dhaka, Bangladesh.
  7. Controlled NOT gate, From Wikipedia, http://en , wikipedia . org/wiki/Controlled_NOT _gate .
  8. Ivan W. Selesniek "Wavelet Transforms A Quick Study", Physies Today magazine, üetober, 2007.
  9. "Blum Blum Shub", From Wikipedia, http://en. wikipe dia. org/wiki/Bluffi_Bluffi_Shub
  10. R Praveen Kumar, V Hemanth, MShareef, Securing Information Using Sterganoraphy, 2013 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]
  11. Ipsita sahoo , SEMINAR REPORT SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS http://www. facweb. iitkgp. ernet. in/~isg/ICTSEMINAR/REPORT-Ipsita. pdf
  12. M Venkteswara Reddy, M Lakshman Naik, Securing Information Using Steganography, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
  13. Darrel Hankerson, Alfred Menezes, Scott Vanstone, Guide to elliptic curve cryptography, springer
  14. Ahaiwe J. Document Security within Institutions Using Image Steganography Technique, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography ECC RGB LSB CNOT gate and PSNR