CFP last date
20 January 2025
Reseach Article

Article:A Method for Public Key Method of Steganography

by Prof. Samir Kumar Bandyopadhyay, Sarthak Parui
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 3
Year of Publication: 2010
Authors: Prof. Samir Kumar Bandyopadhyay, Sarthak Parui
10.5120/1063-1389

Prof. Samir Kumar Bandyopadhyay, Sarthak Parui . Article:A Method for Public Key Method of Steganography. International Journal of Computer Applications. 6, 3 ( September 2010), 7-10. DOI=10.5120/1063-1389

@article{ 10.5120/1063-1389,
author = { Prof. Samir Kumar Bandyopadhyay, Sarthak Parui },
title = { Article:A Method for Public Key Method of Steganography },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 3 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number3/1063-1389/ },
doi = { 10.5120/1063-1389 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:25.827378+05:30
%A Prof. Samir Kumar Bandyopadhyay
%A Sarthak Parui
%T Article:A Method for Public Key Method of Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 3
%P 7-10
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this paper, a public key method of Steganography is proposed under standard cryptographic assumptions. The byte location in LSB of which the secret bit is to be embedded is found out by public key of the receiver and receiver apply private key of itself to reconstruct the secret message following RSA assumptions.

References
  1. Dobsicek, M., Extended steganographic system. In: 8th Intl. Student Conf. On Electrical Engineering, FEE CTU 2004, Poster 04.
  2. Yusuk Lim, Changsheng Xu and David Dagan Feng, “Web based Image Authentication Using Invisible Fragile Watermark”, 2001, Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), Sydney, Australia, Page(s): 31 - 34
  3. Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Trans. Image Processing, volume 6, Issue 4, Aug. 2004 Page(s): 528 - 538
  4. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing Vol 2, No. 2, 2005, Page(s): 104 – 107
  5. Nameer N. EL-Emam "Hiding a large amount of data with high security using steganography algorithm", Journal of Computer Science. April 2007, Page(s): 223 – 232
  6. S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulumi Das, "A Secure Scheme for Image Transformation", August 2008, IEEE SNPD, Page(s): 490 – 493
  7. G. Sahoo, R. K. Tiwari, "Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization", January 2008, IJCSNS, Vol. 8, No. 1,Page(s): 228 – 233.
Index Terms

Computer Science
Information Sciences

Keywords

Communication Security Steganography