We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Stegnography using 12 Square Cipher Algorithm

by Amina Qazi, Asha Ghodake, Rupali Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 7
Year of Publication: 2017
Authors: Amina Qazi, Asha Ghodake, Rupali Patil
10.5120/ijca2017913378

Amina Qazi, Asha Ghodake, Rupali Patil . Stegnography using 12 Square Cipher Algorithm. International Journal of Computer Applications. 162, 7 ( Mar 2017), 10-14. DOI=10.5120/ijca2017913378

@article{ 10.5120/ijca2017913378,
author = { Amina Qazi, Asha Ghodake, Rupali Patil },
title = { Stegnography using 12 Square Cipher Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 7 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number7/27254-2017913378/ },
doi = { 10.5120/ijca2017913378 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:21.526806+05:30
%A Amina Qazi
%A Asha Ghodake
%A Rupali Patil
%T Stegnography using 12 Square Cipher Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 7
%P 10-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Stegnography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favour using digital image files as the cover file to hide another digital file that contains the message or information. One of the most common methods of implementation is Least Significant Bit Insertion. This paper is an attempt to introduce an algorithm which uses LSB Stegnography as the basis and randomly disperses the secret message over the entire image to ensure that the message cannot be obtained easily from the image.

References
  1. Beenish Mehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, Bahria University, Department of Computer Science and Engineering IEEE, 2008.
  2. Neil F.Johnson, Sushil Jajodia, “Exploring Stegnography: Seeing the Unseen”, George Mason University, IEEE Computer, Feb 1998, pp 26-34
  3. Kh.Manglem Singh, LShyamsudar Singh, A.Buboo Singh, “Hiding Secret Message in Edges of the image”, International Conference on Information and Communication Tech, ICICT, 2007Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Mehdi Hussain, Mureed Hussain, “ Pixel Intensity Based High Capacity Data Embedding Method,” Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST)Islamabad, Pakistan.IEEE2010
  5. Gandharba Swain and Saroj Lenka, “Steganography Using the Twelve Square Substitutio Cipher and an Index Variable,” Dept of I T, GMR Institute of Technology, Rajam-53212 Andhra Pradesh, India., IEEE 2011.
  6. WangYan and Ling-di Ping, “A New Steganography Algorithm Based on Spatial Domain”,Second International Symposium on Information Science and Engineering,IEEE 2009,pp 171- 176.
  7. Hamed Modaghegh, Seyed Alireza Seyedin, “Active Steganalysis of Transform Domain Steganography Based on Sparse Component Analysis” Journal of Information Systems and Telecommunication, Vol. 3, No. 2, April-June 2015.
  8. Ratul Choudhury, Samir Kumar Bandyopadhyay, “LSB Based Audio Steganography Using Pattern Matching” Journal of Multidisciplinary Engineering Science and Technology (JMEST) ISSN: 3159-0040 Vol. 2 Issue 11, November – 2015.
  9. Dipanwita Debnath, Suman Deb, Nirmalya Kar, An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & amp; RGB Image Steganography International conference on Computational Intelligence and Networks (CINE), 12-13 Jan.2015.
  10. Subarna Shakya1 , Sanjita Lamichhane, “Secured Crypto Stegano Data Hiding Using Least Significant Bit Substitution And Encryption”, Journal of Advanced College of Engineering and Management, Vol. 2, 2016
Index Terms

Computer Science
Information Sciences

Keywords

Stegnography Digital Images Data hiding LSB insertion