An Approach towards Designing a Cryptographic Confidentiality Algorithm with high PSNR & Time Efficient

Authors

  • Surendra Kumar Sharma Research Scholar, Samrat Ashok Technological Institute, Vidisha (M.P.)
  • Ramratan Ahirwal Research Scholar, Samrat Ashok Technological Institute, Vidisha (M.P.)

Keywords:

Steganography, Cryptography, Data Hiding, LSB Method.

Abstract

Steganography is the technique of hiding valuable information within other data. While cryptography makes sure that the data is unreadable to the third party.  To fulfill the concern of security, many approaches of steganography and cryptography are discussed and developed. In the paper we proposed a work with combined approach of steganography and cryptography and is applied to achieve the goal of security with better efficiency as compared to previous methodologies. The information hiding system is mainly designed with the attributes of characters i.e. RGB values. The proposed work presented in this paper implements the five processing steps of our methodology. These steps consists the generation of a pseudo random number with the help of a 128 bit key, generation of four keys to encrypt the message, encryption by symmetric key encryption technique,  cipher text hiding by replacing the least significant with the application of modified LSB algorithm, and generation of secured message at the end as output. The proposed algorithm is designed in such a way that before hiding a bit, the bit is optimized first that it increases the PSNR value as compared with previous algorithms without affecting the other parameters. 

References

. Md. Palash Uddin, Mousumi Saha, Syeda Jannatul Ferdousi, Masud Ibn Afjal, Md. Abu Marjan, “Developing an Efficient Solution to Information Hiding through Text Steganography along with Cryptography” The 9th International Forum on Strategic Technology (IFOST), October 21-23, 2014, Cox’s Bazar, Bangladesh, IEEE

. Xing Tang, Mingsong Chen, “Design And Implementation Of Information Hiding System Based On RGB”, 2013 IEEE.

. Rishav Ray, Jeeyan Sanyal, Debanjan Das, Asoke Nath, “A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file: RJDA Algorithm”, 2012 International Conference on Communication Systems and Network Technologies, IEEE.

. Symmetric Key Cryptography using Random Key generator : Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: “Proceedings of International conference on security and management(SAM’10” held at Las Vegas, USA Jul 12-15, 2010), P-Vol-2, 239-244(2010).

. An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Choudhary, Asoke Nath: Communicated for publication in IEEE International conference WICT 2011 to be held at Mumbai Dec 11-14, 2011.

. Data Hiding and Retrieval : Asoke Nath, Sankar Das, Amlan Chakraborty, published in IEEE “Proceedings of International Conference on Computational Intelligence and Communication Networks(CICN 2010)” held from 26-28 NOV’ 2010 at Bhopal.

. Advanced Steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2, LSB+3 bits in non standard cover files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications, Vol- 14, No. 7, Page-31-35, Feb (2011).

. Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and Asoke Nath, International Journal of Computer Science and Applications, Vol-2, No. 3, Page- 19-24, Mar (2010).

. A Challenge in hiding encrypted message in LSB and LSB+1 bit positions in any cover files: executable files, Microsoft Office files and database files, image files, audio and video files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath : JGRCS, Vol-2, No. 4, Page- 180-185, Apr (2011).

. New Data Hiding Algorithm in MATLAB using Encrypted secret message: Agniswar Dutta, Abhirup Kumar Sen, Sankar Das, Shalabh Agarwal and Asoke Nath : Proceedings of IEEE CSNT- 2011 held at SMVDU (Jammu), 03-06 Jun, 2011, Page 262-267.

Downloads

Published

2017-02-24

How to Cite

Sharma, S. K., & Ahirwal, R. (2017). An Approach towards Designing a Cryptographic Confidentiality Algorithm with high PSNR & Time Efficient. International Journal of Computer (IJC), 24(1), 117–129. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/827

Issue

Section

Articles