Secure Data Transfer through a Combination of Steganographic and Cryptographic Encryption Technique

Authors

  • Swati Saxena SRM University , Kattankulathur, India

DOI:

https://doi.org/10.51611/iars.irj.v4i2.2014.38

Keywords:

STEGANOGRAPHY, INFORMATION SECURITY, ENCRYPTION, WATERMARK

Abstract

Security for information has become a great concern in today’s internet era. Thus sending sensitive information from one end to another end via common communicating channel has become inevitable. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance, applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper aims at studying popular encryption techniques and their drawbacks due to which they could not be put to practical use along with a proposed method of successfully encrypting information both in image and text format combing their successful delivery to the destination using steganographic and cryptographic techniques of information encryption.

Downloads

Download data is not yet available.

References

Nirinjan, U.C. & Anand, D. "WATERMARKING MEDICAL IMAGES WITH PATIENT INFORMATION". In the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, China, 1998, pp. 703-06.
Katiyar, S.; Meka, K.R.; Barbhuiya, F.A. & Nandi, S. "ONLINE VOTING SYSTEM POWERED BY BIOMETRIC SECURITY USING STEGANOGRAPHY". 2nd International Conference on Emerging Applications of Information Technology (EAIT), Kolkata, India, 2011, pp. 288-291.
Jaswinder Kaur, Inderjeet & Manoj Duhan, “A COMPARATIVE ANALYSIS OF STEGANOGRAPHIC TECHNIQUES”, IJITKM, Vol.2, No. 1 2009.
Hao-Tian Wu and Jean-Luc Dugelay , (2009) “STEGANOGRAPHY IN 3D GEOMETRICS AND IMAGES BY ADJACENT BIT MAPPING”, EURASIP Journal on Information Security, Vol. 2009, Article ID 317165, pp1-10. IJCSES Vol.4, No.6, December 2013
Brassil J., S. Low, N. Maxemchuk, L. O'Goram, "HIDING INFORMATION IN DOCUMENT IMAGES," CISS95. ftp://ftp.research.att.com/dist/brassil/ 1995/ciss95.ps.Z
Comiskey, B. O. and J.R. Smith, "MODULATION AND INFORMATION HIDING IN IMAGES," in: Information Hiding, First International Workshop, edited by Ross J. Anderson. Cambridge, U.K., May 30-June 1, 1996, Proceedings. Lecture Notes in Computer Science, Vol. 1174, Springer-Verlag, 1996 http://sunsite.informatik.rwth-aachen.de/dblp/db/conf/ih/ih96.html
Cox, J. L, J. Kilian, T. Leighton, and T. Shamoon, "SECURE SPREAD SPECTRUMWATERMARKING FOR MULTIMEDIA," NEC Research Institute, Technical Report 95-10.
Craver, S., N. Memon, B.-L. Yeo, and M. Yeung. "CAN INVISIBLE WATERMARKS RESOLVE RIGHTFUL OWNERSHIPS?" Proceedings of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, Feb. 13-14, 1997, vol. 3022, pp. 310-321.
Delaigle, J.-F., C. De Vleeschouwer, B. Macq, "DIGITAL WATERMARKING OF IMAGES," Proceedings of the IS&T/SPIE Symposium on Electronic Imaging Science and Technology,1996.
Dixon R. C, SPREAD SPECTRUM SYSTEMS WITH COMMERCIAL APPLICATIONS. Wiley, New York, 1994.
Fridrich, J., "ON DIGITAL WATERMARKS," paper for the 2nd Information Hiding Workshop in Portland, Oregon, April 15-17, 1998.
Fridrich, J. "SYMMETRIC CIPHERS BASED ON TWO-DIMENSIONAL CHAOTIC MAPS," to appear in Int. J. Bifurcation and Chaos, 8(6), June 1998.
Girod B. and F. Härtung, "WATERMARKING METHOD AND APPARATUS FOR COMPRESSED DIGITAL VIDEO", US Patent application, 1996. http://www-nt.e-technik.unierlangen. de/~hartung/watermarking.html
Handel and Sanford http://www.lanl.gov/users/u078743/embedl.htm
Maxwell T. Sandford U, Jonathan N. Bradley, and Theodore G. Handel. "THE DATA EMBEDDING METHOD". In Proc. of the SPIE Photonics East Conference, Philadelphia, September 1995.
Härtung F. and B. Girod, "DIGITAL WATERMARKING OF RAW AND COMPRESSED VIDEO", Proc. European EOS/SPIE Symposium on Advanced Imaging and Network Technologies, Berlin, Germany, Oct. 1996.

Crossref Crossmark

Downloads

Published

2014-08-29

Issue

Section

Peer Reviewed Research Manuscript

How to Cite

“Secure Data Transfer through a Combination of Steganographic and Cryptographic Encryption Technique” (2014) IARS’ International Research Journal, 4(2). doi:10.51611/iars.irj.v4i2.2014.38.

Citations

Similar Articles

1-10 of 38

You may also start an advanced similarity search for this article.