CFP last date
20 December 2024
Reseach Article

Article:Proposed System for data hiding using Cryptography and Steganography

by Dipti Kapoor Sarmah, Neha Bajpai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 9
Year of Publication: 2010
Authors: Dipti Kapoor Sarmah, Neha Bajpai
10.5120/1238-1714

Dipti Kapoor Sarmah, Neha Bajpai . Article:Proposed System for data hiding using Cryptography and Steganography. International Journal of Computer Applications. 8, 9 ( October 2010), 7-10. DOI=10.5120/1238-1714

@article{ 10.5120/1238-1714,
author = { Dipti Kapoor Sarmah, Neha Bajpai },
title = { Article:Proposed System for data hiding using Cryptography and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 9 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number9/1238-1714/ },
doi = { 10.5120/1238-1714 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:56.989151+05:30
%A Dipti Kapoor Sarmah
%A Neha Bajpai
%T Article:Proposed System for data hiding using Cryptography and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 9
%P 7-10
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured.

References
  1. Domenico Daniele Bloisi , Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1 , pp. 127-134 .
  2. Kharrazi, M., Sencar, H. T., and Memon, N. (2004). Image Steganography: Concepts and practice. In WSPC Lecture Notes Series
  3. D.R. Stinson, Cryptography: Theory and Practice, Boca Raton, CRC Press, 1995. ISBN: 0849385210
  4. Provos, N. and Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE SECURITY & PRIVACY
  5. Chandramouli, R., Kharrazi, M. & Memon, N., “Image Steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003
  6. Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002
  7. Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
  8. Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston. London, 2000.
  9. Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004
  10. Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
  11. Dunbar, B., “Steganography techniques and their use in an Open-Systems environment”, SANS Institute, January 2002
  12. Bender, W., Gruhl, D., Morimoto, N. & Lu, A., “Techniques for data hiding”, IBM Systems Journal, Vol 35, 1996
  13. C.E., Shannon, (1949), Communication theory of secrecy systems, Bell System Technical Journal, 28, 656-715.
  14. N. F. Johnson and S. Katzenbeisser, .A survey of steganographic techniques., in S. Katzenbeisser and F. Peticolas (Eds.): Information Hiding, pp.43-78. Artech House, Norwood, MA, 2000.
  15. Currie, D.L. & Irvine, C.E., “Surmounting the effects of lossy compression on Steganography”, 19th National Information Systems Security Conference, 1996
  16. G., Derrick, (2001), Data watermarking Steganography and watermarking of digital data, Computer Law & Security Report, 17 (2), 101-104.
  17. Ross J. Anderson, Fabien A.P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected Areas in Communications, 16(4): 474-481, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.
  18. http://www.codeproject.com/KB/library/ArisFFTDFTLibrary.aspx
  19. http://www.xdp.it
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Stego- image Threshold Value DCT Coefficient