2nd International conference on Computing Communication and Sensor Network 2013 |
Foundation of Computer Science USA |
CCSN2013 - Number 1 |
December 2013 |
Authors: Sudipta Sahana, Abhipsa Kundu, Ahana Pal |
946fc840-66dc-4f61-a0c8-a08ba379c647 |
Sudipta Sahana, Abhipsa Kundu, Ahana Pal . Crypt Arithmetic Stego based Encryption Algorithm for Secure Data Transfer. 2nd International conference on Computing Communication and Sensor Network 2013. CCSN2013, 1 (December 2013), 16-22.
Information security is the most important issues in network communication in current days. Safe and sound data transfer become more essential and significant, as security is a major concern in the field of message transformation over internet in current years, Cryptography and Steganography are two significant areas of research that involve a number of applications. Cryptography is the technology that involves converting a message text into an unreadable cipher. Steganography is an art of hiding information in a cover image without causing statistically significant change to the cover image, so a carrier is needed to transfer information. In this proposed work the plain text is transformed to a cipher text using Cryptography technique where after changing the original text into its equivalent binary bits generally different kind of Boolean algebraic operations are used and in the succeeding step using Steganography technique this cipher text is hidden inside a gray scale image as a cover media with dimension 2m x 2m and a secure pictorial block steganography based encryptionalgorithm is proposed to execute the concept of secrecy for transferring text messagesbefore transmitting the information and also mentioned the Cryptanalysis and Steganalysis method for retrieving data at receiver side. The experimental result shows that the algorithm hasa high capacity and is better than the previous recommended PBST [5] techniqueFurthermore, satisfactory security is maintainedsince the secret message that is hidden inside the image cannot be extracted withoutknowing the cryptanalysis technique.