A new horizon in data security by Cryptography & Steganography
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are available to hide messages. It is very difficult to detect hidden message in frequency domain and for this domain various transformations like DCT, FFT, Wavelets etc are available. In this paper we propose a new technique in which Cryptography and Steganography are used as integrated part along with newly enhanced security module for transmitting text. Before encryption we are using Huffman compression technique to compress the input plain text and compressed text is encrypted using advanced encryption standard (AES. After encryption, a part of the compressed encrypted message (cipher) is hidden in DCT of an image; remaining part of the cipher is used as a secret key to regenerate the cipher text. Introduction of compression technique improves the data hiding capacity and partial cipher hiding in stego-image make this system more secured.
Authors and Affiliations
Dipti Kapoor Sarmah , Neha Bajpai
AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of informatio...
Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform
Significant features of the ECG signal include the P wave, the QRS complex, and the T wave. This paper focuses on the detection of the P wave and T wave. Determining the position of the P wave and T wave is complicated d...
Anti-Phishing Design Using Mutual Authentication Approach
The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....
METADATA STANDARD HARVESTING
The rapid growth of Internet resources, digital collections and libraries are constructed with the help of metadata schemas. Each metadata schema has been designed based on the requirements of the particular user communi...
Fuzzy K-mean Clustering Via J48 For Intrusiion Detection System
Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection....