An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission

被引:0
作者
Sriram, S. [1 ]
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Raj, Anishin M. M. [2 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur, India
[2] Viswajyothi Coll Engn & Technol, Ernakulam, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2015年
关键词
Steganography; Cryptography; Rotor cipher; Data Hiding; LSB Steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [31] A safe and secured iris template using steganography and cryptography
    Oluwakemi Christiana Abikoye
    Umar Abdulraheem Ojo
    Joseph Bamidele Awotunde
    Roseline Oluwaseun Ogundokun
    Multimedia Tools and Applications, 2020, 79 : 23483 - 23506
  • [32] A safe and secured iris template using steganography and cryptography
    Abikoye, Oluwakemi Christiana
    Ojo, Umar Abdulraheem
    Awotunde, Joseph Bamidele
    Ogundokun, Roseline Oluwaseun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 23483 - 23506
  • [33] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [34] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [35] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [36] An enhanced Hill cipher approach for image encryption in steganography
    Karthikeyan, B.
    Chakravarthy, Jagannathan
    Vaithiyanathan, V.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 178 - 187
  • [37] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    B. Prasanalakshmi
    K. Murugan
    Karthik Srinivasan
    S. Shridevi
    Shermin Shamsudheen
    Yu-Chen Hu
    The Journal of Supercomputing, 2022, 78 : 361 - 378
  • [38] Multilayer Security Using RSA Cryptography and Dual Audio Steganography
    Bangera, Kripa N.
    Paddambail, Yashika
    Reddy, N. V. Subba
    Shivaprasad, G.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 492 - 495
  • [39] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    Prasanalakshmi, B.
    Murugan, K.
    Srinivasan, Karthik
    Shridevi, S.
    Shamsudheen, Shermin
    Hu, Yu-Chen
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01) : 361 - 378
  • [40] Digital Image Steganography Using Modified LSB and AES Cryptography
    Panwar, Subhash
    Kumar, Mukesh
    Sharma, Sakshi
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 366 - 375