An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission

被引:0
|
作者
Sriram, S. [1 ]
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Raj, Anishin M. M. [2 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur, India
[2] Viswajyothi Coll Engn & Technol, Ernakulam, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2015年
关键词
Steganography; Cryptography; Rotor cipher; Data Hiding; LSB Steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [21] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [22] A novel secure cryptography model for data transmission based on Rotor64 technique
    Obeidat, Ibrahim
    Mughaid, Ala
    AlZu'bi, Shadi
    AL-Arjan, Ahmed
    AL-Amrat, Rula
    AL-Ajmi, Rathaa
    AL-Hayajneh, Razan
    Abuhaija, Belal
    Abualigah, Laith
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 37295 - 37314
  • [23] A novel secure cryptography model for data transmission based on Rotor64 technique
    Ibrahim Obeidat
    Ala Mughaid
    Shadi AlZu’bi
    Ahmed AL-Arjan
    Rula AL-Amrat
    Rathaa AL-Ajmi
    Razan AL-Hayajneh
    Belal Abuhaija
    Laith Abualigah
    Multimedia Tools and Applications, 2024, 83 : 37295 - 37314
  • [24] Secure Transmission of Medical Information Using IRIS Recognition and Steganography
    Barkathunisha, S.
    Meenakumari, R.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC 2013), 2013, : 89 - 92
  • [25] Secure QR-Code Based Message Sharing System Using Cryptography and Steganography
    Mendhe, Abhijeet
    Gupta, Deepak Kumar
    Sharma, Krishna Pal
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 188 - 191
  • [26] A Novel Approach to Secure Communication using Audio Steganography
    Srivastava, Mayank
    Rafiq, Mohd Qasim
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 963 - +
  • [27] Dual Steganography Approach for Secure Data Communication
    Sakthisudhan, K.
    Prabhu, P.
    Thangaraj, P.
    Marimuthu, C. M.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 412 - 417
  • [28] A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher
    Swain, Gandharba
    Lenka, Saroj Kumar
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 842 - +
  • [29] Two New Approaches for Image Steganography Using Cryptography
    Sharma, Vipul
    Madhusudan
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 202 - 207
  • [30] High Payload Capacity using Steganography Combined with Cryptography
    Deepak, Tatavarthi Sai
    Enireddy, Vamsidhar
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1448 - 1453