CFP last date
20 January 2025
Reseach Article

Enhancing the Impregnability of Text Messages at Multiple Levels

Published on May 2012 by S. Gurusubramani, T. Prabahar Godwin James, Venkatesh
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 1
May 2012
Authors: S. Gurusubramani, T. Prabahar Godwin James, Venkatesh
058adb7b-0b8a-430c-8c43-887d46fc5335

S. Gurusubramani, T. Prabahar Godwin James, Venkatesh . Enhancing the Impregnability of Text Messages at Multiple Levels. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 1 (May 2012), 28-31.

@article{
author = { S. Gurusubramani, T. Prabahar Godwin James, Venkatesh },
title = { Enhancing the Impregnability of Text Messages at Multiple Levels },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 1 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 28-31 },
numpages = 4,
url = { /proceedings/ncacsa/number1/6482-1007/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A S. Gurusubramani
%A T. Prabahar Godwin James
%A Venkatesh
%T Enhancing the Impregnability of Text Messages at Multiple Levels
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 1
%P 28-31
%D 2012
%I International Journal of Computer Applications
Abstract

In the field of Data Communication, security-issues have got the top priority. The degree of security provided by a security tool has become the main evolutionary criteria. There has been an ample of security tools to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less. Classical Cryptography is one of the ways to secure plain text messages. The proposed model combines cryptography, steganography with an extra layer enforcing security. This newly introduced layer imposes the concept of secrecy over privacy. The Proposed System has an additional level of security. In this project the concept of Multi Layer Data Security (MLDS) has been introduced. For encryption and decryption, a mathematical operation called Multiplicative Modulo (MM) has been used in between the text and the generated keys. Here, the concept of Cryptography and Steganography (as two Layers of Security) and in between them an extra layer of security is introduced. The two new methods namely Code Matrix Mapping and Matrix Pix Mapping (MPM) are used to employ the above mentioned extra security layer. This newly introduced extra layer of security changes the format of normal encrypted messages and the security layer followed by it embeds the encrypted messages behind multimedia cover object. In the first layer of security, the original text message is encrypted by applying a function involving mathematical operations. In the second layer, the encrypted code is converted into binary matrix by a Mapping method. In the third layer of security, the matrices obtained above are mapped into pixels of an image.

References
  1. "Text Steganography: A Novel Approach" Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay & Tai-hoon Kim International Journal of Advanced Science and Technology Vol. 3, February 2009.
  2. "A Tutorial Review on Steganography" IC3 – 2008.
  3. "Hiding Encrypted Message in the Features of Images", Kh. Manglem Singh, S. Birendra Singh and L. Shyam Sundar Singh IJCSNS, VOL. 7, No. 4, April 2007.
  4. "Image based steganography using LSB insertion technique", Sutaone, M. S. , Khandare, M. V IEEE WMMN pp. 146-151, January 2008.
  5. "A Multi Layer Security Model for Text Messages" Debnath Bhattacharyya, Poulami Das, Debashis Ganguly, Swarnendu Mukherjee 2009 IEEE International Advance Computing Conference (IACC 2009) March2009.
Index Terms

Computer Science
Information Sciences

Keywords

Lsb Rgb Dp Mlds Ide Mpm Ascii Mm