A new horizon in data security by Cryptography & Steganography 

Abstract

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are available to hide messages. It is very difficult to detect hidden message in frequency domain and for this domain various transformations like DCT, FFT, Wavelets etc are available. In this paper we propose a new technique in which Cryptography and Steganography are used as integrated part along with newly enhanced security module for transmitting text. Before encryption we are using Huffman compression technique to compress the input plain text and compressed text is encrypted using advanced encryption standard (AES. After encryption, a part of the compressed encrypted message (cipher) is hidden in DCT of an image; remaining part of the cipher is used as a secret key to regenerate the cipher text. Introduction of compression technique improves the data hiding capacity and partial cipher hiding in stego-image make this system more secured. 

Authors and Affiliations

Dipti Kapoor Sarmah , Neha Bajpai

Keywords

Related Articles

AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)

In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of informatio...

Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform

Significant features of the ECG signal include the P wave, the QRS complex, and the T wave. This paper focuses on the detection of the P wave and T wave. Determining the position of the P wave and T wave is complicated d...

Anti-Phishing Design Using Mutual Authentication Approach

The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....

METADATA STANDARD HARVESTING

The rapid growth of Internet resources, digital collections and libraries are constructed with the help of metadata schemas. Each metadata schema has been designed based on the requirements of the particular user communi...

 Fuzzy K-mean Clustering Via J48 For Intrusiion Detection System

Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection....

Download PDF file
  • EP ID EP150128
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

Dipti Kapoor Sarmah, Neha Bajpai (2010).  A new horizon in data security by Cryptography & Steganography . International Journal of Computer Science and Information Technologies, 1(4), 212-220. https://europub.co.uk/articles/-A-150128