We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File

by Joyshree Nath, Saima Ghosh, Asoke Nath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 14
Year of Publication: 2012
Authors: Joyshree Nath, Saima Ghosh, Asoke Nath
10.5120/6974-9266

Joyshree Nath, Saima Ghosh, Asoke Nath . Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File. International Journal of Computer Applications. 46, 14 ( May 2012), 1-7. DOI=10.5120/6974-9266

@article{ 10.5120/6974-9266,
author = { Joyshree Nath, Saima Ghosh, Asoke Nath },
title = { Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 14 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number14/6974-9266/ },
doi = { 10.5120/6974-9266 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:39:41.011306+05:30
%A Joyshree Nath
%A Saima Ghosh
%A Asoke Nath
%T Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 14
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present work the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. In step-1 the secret message is encrypted using TTJSA algorithm. In step-2 we embed this encrypted message inside one known image or audio file using 4-th bit from LSB substitution method. In step-3 we again encrypt the embedded cover file using TTJSA algorithm . Finally embed this encrypted cover file in final known cover file which may be some image or audio file. In the present method the authors used data hiding and encryption in two steps to make the entire steganography method almost unbreakable. The sender and the receiver have to share a set of secret keys which should not be shared by any outsider who is not the sender or the receiver. Due to multiple time encryption and multiple time data hiding it is almost impossible for any intruder to extract secret message from embedded cover file. Nath et al developed several steganography algorithm where the encrypted secret message is embedded inside some standard or non-standard cover file. It means the data hiding was done in one step but in the present study the encryption is done in two steps and data hiding is also done in two steps. . For encrypting secret message the authors have used new algorithm namely TTJSA developed by Nath et al. In TTJSA method the authors have used bit-exchange, bit-xor and modified playfair method i. e. MSA. . For hiding encrypted message the authors have used substitution of bits in 4-th bit from LSB of the cover file. The present method may be used for sharing secret keys between sender and receiver and also to send some very important confidential message from sender to receiver. In defense or in Banking sector also the present method may be used for sending some crucial and important message.

References
  1. Symmetric Key Cryptography using Random Key generator : Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on security and management(SAM'10" held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, 239-244(2010).
  2. Data Hiding and Retrieval : Asoke Nath, Sankar Das, Amlan Chakraborti, published in IEEE "Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN 2010)" held from 26-28 NOV'2010 at Bhupal.
  3. Advanced steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2 and LSB+3 bits in non standard cover files: Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications, Vol14-No. 7,Page-31-35, Feb(2011).
  4. Advanced Symmetric key Cryptography using extended MSA method: DJSSA symmetric key algorithm: Dripto Chatterjee, Joyshree Nath, Soumitra Mondal, Suvadeep Dasgupta and Asoke Nath, Jounal of Computing, Vol3, issue-2, Page 66-71,Feb(2011).
  5. Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and Asoke Nath, International Journal of Advanced Computer Science and Applications, Vol-2, No-3, Page-19-24, March(2011).
  6. A Challenge in hiding encrypted message in LSB and LSB+1 bit positions in any cover files : executable files, Microsoft office files and database files, image files, audio files and video files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath : JGRCS, Vol-2, No. 4, Page:180-185,April (2011).
  7. New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm :Neeraj Khanna, Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011). .
  8. New Data Hiding Algorithm in MATLAB using Encrypted secret message :Agniswar Dutta, Abhirup Kumar Sen, Sankar Das,Shalabh Agarwal and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 262-267(2011).
  9. An efficient data hiding method using encrypted secret message obtained by MSA algorithm: Joyshree Nath, Meheboob Alam Mallik , Saima Ghosh and Asoke Nath : Proceedings of the International conference Worldcomp 2011 held at Las Vegas(USA), 18-21 Jul(2011), Page 312-318, Vol-1(2011)
  10. Symmetric key cryptosystem using combined cryptographic algorithms- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm – Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey and Asoke Nath, Proceedings of IEEE International conference : World Congress WICT-2011 t held at Mumbai University 11-14 Dec, 2011, Page No. 1179-1184(2011).
  11. A new randomized data hiding algorithm with encrypted secret message using modified generalized Vernam Cipher Method: RAN-SEC algorithm, Rishav Ray, Jeeyan Sanyal, Tripti Das, Kaushik Goswami, Sankar Das and Asoke Nath, Proceedings of IEEE International conference : World Congress WICT-2011 held at Mumbai University 11-14 Dec, 2011, Page No. 1215-1220 (2011).
  12. Jpeg20000 Standard for Image Compression Concepts algorithms and VLSI Architectures by Tinku Acharya and Ping-Sing Tsai, Wiley Interscience.
Index Terms

Computer Science
Information Sciences

Keywords

Msa Ttjsa njjsaa Lsb Steganography Encryption