An Approach towards Designing a Cryptographic Confidentiality Algorithm with high PSNR & Time Efficient

Surendra Kumar Sharma, Ramratan Ahirwal

Abstract


Steganography is the technique of hiding valuable information within other data. While cryptography makes sure that the data is unreadable to the third party.  To fulfill the concern of security, many approaches of steganography and cryptography are discussed and developed. In the paper we proposed a work with combined approach of steganography and cryptography and is applied to achieve the goal of security with better efficiency as compared to previous methodologies. The information hiding system is mainly designed with the attributes of characters i.e. RGB values. The proposed work presented in this paper implements the five processing steps of our methodology. These steps consists the generation of a pseudo random number with the help of a 128 bit key, generation of four keys to encrypt the message, encryption by symmetric key encryption technique,  cipher text hiding by replacing the least significant with the application of modified LSB algorithm, and generation of secured message at the end as output. The proposed algorithm is designed in such a way that before hiding a bit, the bit is optimized first that it increases the PSNR value as compared with previous algorithms without affecting the other parameters. 


Keywords


Steganography; Cryptography; Data Hiding; LSB Method.

Full Text:

PDF

References


. Md. Palash Uddin, Mousumi Saha, Syeda Jannatul Ferdousi, Masud Ibn Afjal, Md. Abu Marjan, “Developing an Efficient Solution to Information Hiding through Text Steganography along with Cryptography” The 9th International Forum on Strategic Technology (IFOST), October 21-23, 2014, Cox’s Bazar, Bangladesh, IEEE

. Xing Tang, Mingsong Chen, “Design And Implementation Of Information Hiding System Based On RGB”, 2013 IEEE.

. Rishav Ray, Jeeyan Sanyal, Debanjan Das, Asoke Nath, “A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file: RJDA Algorithm”, 2012 International Conference on Communication Systems and Network Technologies, IEEE.

. Symmetric Key Cryptography using Random Key generator : Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: “Proceedings of International conference on security and management(SAM’10” held at Las Vegas, USA Jul 12-15, 2010), P-Vol-2, 239-244(2010).

. An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Choudhary, Asoke Nath: Communicated for publication in IEEE International conference WICT 2011 to be held at Mumbai Dec 11-14, 2011.

. Data Hiding and Retrieval : Asoke Nath, Sankar Das, Amlan Chakraborty, published in IEEE “Proceedings of International Conference on Computational Intelligence and Communication Networks(CICN 2010)” held from 26-28 NOV’ 2010 at Bhopal.

. Advanced Steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2, LSB+3 bits in non standard cover files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications, Vol- 14, No. 7, Page-31-35, Feb (2011).

. Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and Asoke Nath, International Journal of Computer Science and Applications, Vol-2, No. 3, Page- 19-24, Mar (2010).

. A Challenge in hiding encrypted message in LSB and LSB+1 bit positions in any cover files: executable files, Microsoft Office files and database files, image files, audio and video files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath : JGRCS, Vol-2, No. 4, Page- 180-185, Apr (2011).

. New Data Hiding Algorithm in MATLAB using Encrypted secret message: Agniswar Dutta, Abhirup Kumar Sen, Sankar Das, Shalabh Agarwal and Asoke Nath : Proceedings of IEEE CSNT- 2011 held at SMVDU (Jammu), 03-06 Jun, 2011, Page 262-267.


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).