International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 46 - Number 14 |
Year of Publication: 2012 |
Authors: Joyshree Nath, Saima Ghosh, Asoke Nath |
10.5120/6974-9266 |
Joyshree Nath, Saima Ghosh, Asoke Nath . Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File. International Journal of Computer Applications. 46, 14 ( May 2012), 1-7. DOI=10.5120/6974-9266
In the present work the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. In step-1 the secret message is encrypted using TTJSA algorithm. In step-2 we embed this encrypted message inside one known image or audio file using 4-th bit from LSB substitution method. In step-3 we again encrypt the embedded cover file using TTJSA algorithm . Finally embed this encrypted cover file in final known cover file which may be some image or audio file. In the present method the authors used data hiding and encryption in two steps to make the entire steganography method almost unbreakable. The sender and the receiver have to share a set of secret keys which should not be shared by any outsider who is not the sender or the receiver. Due to multiple time encryption and multiple time data hiding it is almost impossible for any intruder to extract secret message from embedded cover file. Nath et al developed several steganography algorithm where the encrypted secret message is embedded inside some standard or non-standard cover file. It means the data hiding was done in one step but in the present study the encryption is done in two steps and data hiding is also done in two steps. . For encrypting secret message the authors have used new algorithm namely TTJSA developed by Nath et al. In TTJSA method the authors have used bit-exchange, bit-xor and modified playfair method i. e. MSA. . For hiding encrypted message the authors have used substitution of bits in 4-th bit from LSB of the cover file. The present method may be used for sharing secret keys between sender and receiver and also to send some very important confidential message from sender to receiver. In defense or in Banking sector also the present method may be used for sending some crucial and important message.