National Conference on Advances in Computer Science and Applications (NCACSA 2012) |
Foundation of Computer Science USA |
NCACSA - Number 1 |
May 2012 |
Authors: S. Gurusubramani, T. Prabahar Godwin James, Venkatesh |
058adb7b-0b8a-430c-8c43-887d46fc5335 |
S. Gurusubramani, T. Prabahar Godwin James, Venkatesh . Enhancing the Impregnability of Text Messages at Multiple Levels. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 1 (May 2012), 28-31.
In the field of Data Communication, security-issues have got the top priority. The degree of security provided by a security tool has become the main evolutionary criteria. There has been an ample of security tools to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less. Classical Cryptography is one of the ways to secure plain text messages. The proposed model combines cryptography, steganography with an extra layer enforcing security. This newly introduced layer imposes the concept of secrecy over privacy. The Proposed System has an additional level of security. In this project the concept of Multi Layer Data Security (MLDS) has been introduced. For encryption and decryption, a mathematical operation called Multiplicative Modulo (MM) has been used in between the text and the generated keys. Here, the concept of Cryptography and Steganography (as two Layers of Security) and in between them an extra layer of security is introduced. The two new methods namely Code Matrix Mapping and Matrix Pix Mapping (MPM) are used to employ the above mentioned extra security layer. This newly introduced extra layer of security changes the format of normal encrypted messages and the security layer followed by it embeds the encrypted messages behind multimedia cover object. In the first layer of security, the original text message is encrypted by applying a function involving mathematical operations. In the second layer, the encrypted code is converted into binary matrix by a Mapping method. In the third layer of security, the matrices obtained above are mapped into pixels of an image.