Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Subramanyan, N.
- Nearest Prime Cipher for Data Confidentiality and Integrity
Abstract Views :139 |
PDF Views:5
Authors
Affiliations
1 Dept of CSE, YSREC of YV University, Proddatur, IN
2 YSREC of YV University, Proddatur, IN
1 Dept of CSE, YSREC of YV University, Proddatur, IN
2 YSREC of YV University, Proddatur, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 6 (2016), Pagination: 2944-2948Abstract
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2's complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.Keywords
2’s Complement, Ciphertext, Cryptography, Nearest Prime Number, Plaintext, XOR Operation.- Robust Lossless Secure Image Steganography Using Spiral Scan
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
2 Department of Physics, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
1 Department of CSE, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
2 Department of Physics, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 5 (2018), Pagination: 3596-3600Abstract
Steganography is the principles and techniques of embedding data within other data. Cryptography is the principles and techniques of changing the data one form to another form. Image Steganography is the process of hiding data within an image. Steganography along with encryption techniques provides an additional security to the data. Several techniques exist for image steganography, in this work, a new lossless image steganography technique along with cryptographic method is presented. Lossless compression is a class of algorithms that allows the original data to be perfectly reconstructed from the compressed data. Present work concentrates the lower nibble of pixels in the cover image for embedding the information; further encryption techniques will be applied. It is not possible for the hacker to retrieve the secured data from the cover image.Keywords
Compression, Cover Image, Cryptography, Lossless, Nibble, Steganograpy.References
- Petitcolas, F.A.P., Anderson, R.J. & Kuhn, M.G., “Information Hiding – A survey”, Proceedings of the IEEE, 87:07, July 1999.
- Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
- Pranab Garg, Jaswinder Singh Dilawari, "A Review Paper on Cryptography and Significance of Key Length", IJCSCE Special issue on“Emerging Trends in Engineering ICETIE 2012.
- Chandramouli, R., Kharrazi, M. & Memon, N., “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003.
- Sumeet Kaur, Savina Bansal, "Steganography and Classification of Image Steganography Techniques", Published in: Computing for Sustainable Global Development (INDIACom), 2014 International conference.
- Gaurav Vijayvargiya, Dr. Sanjay Silakari, Dr.Rajeev Pandey, "A Survey: Various Techniques of Image Compression", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 11, No. 10, October 2013.
- Rashi Singh, Gaurav Chavla, “ Data Hiding at 7th bit (RGB) with cryptography”, IJCSMC, vol 3, issue 5, may 2014.
- Chang, Chin-Chen., Lin, Iuan-Chang., and Yaun-Hui YU., “ A new Steganographic method for color and gray scale image hiding”, Computer Vision and Image Understanding, ELSEVIER, Vol. 107, No. 3, pp. 183-194,2007.
- Shreelekshmi R, Wilscy C, Madhavan V. "Cover image preprocessing for more reliable LSB replacement steganography". In: Proc. of International Conf. on Signal Acquisition and Processing; 2010. p. 153–56.
- S.S.Maniccama, N.G.Bourbakis, “Image and video encryption using SCAN patterns” Pattern Recognition Volume 37, Issue 4, April 2004, Pages 725-737.