A new horizon in data security by Cryptography & Steganography 

Abstract

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are available to hide messages. It is very difficult to detect hidden message in frequency domain and for this domain various transformations like DCT, FFT, Wavelets etc are available. In this paper we propose a new technique in which Cryptography and Steganography are used as integrated part along with newly enhanced security module for transmitting text. Before encryption we are using Huffman compression technique to compress the input plain text and compressed text is encrypted using advanced encryption standard (AES. After encryption, a part of the compressed encrypted message (cipher) is hidden in DCT of an image; remaining part of the cipher is used as a secret key to regenerate the cipher text. Introduction of compression technique improves the data hiding capacity and partial cipher hiding in stego-image make this system more secured. 

Authors and Affiliations

Dipti Kapoor Sarmah , Neha Bajpai

Keywords

Related Articles

Effect of User-Unknown Email addresses in spammers' lists

Spam emails are an extra burden over the network and also another Issue for the security of the internet. Today lot of spam mail are coming from the different resources. Many approaches and method are there to filter th...

Performance issues on AODV and AOMDV for MANETS

One of the main challenges of MANET is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. A variety of routing protocols have been proposed and...

Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)

The aim of this paper is to study the management of Information Technology (IT) security in Kenyan Small and Medium Enterprises (SMEs). Particularly, this study looks at whether SMEs have a designated employee in charge...

CHALLENGES IN COMPUTING TODAY 

This paper reviews the challenges faced by ordinary users in the domain of computing today.As there are numerous problems in computing,with each problem centered around different issues and each one r...

An Enhancing approach in MEDLINE & PubMed using Text Mining 

Text mining is a new and exciting research area that attempts to solve the information overload problem. Information extraction using text mining has been applied to many different areas of bio-medici...

Download PDF file
  • EP ID EP150128
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Dipti Kapoor Sarmah, Neha Bajpai (2010).  A new horizon in data security by Cryptography & Steganography . International Journal of Computer Science and Information Technologies, 1(4), 212-220. https://europub.co.uk/articles/-A-150128