An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission

被引:0
作者
Sriram, S. [1 ]
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Raj, Anishin M. M. [2 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur, India
[2] Viswajyothi Coll Engn & Technol, Ernakulam, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2015年
关键词
Steganography; Cryptography; Rotor cipher; Data Hiding; LSB Steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [41] Cryptography model to secure IoT device endpoints, based on polymorphic cipher OTP
    Bran, Carlos
    Flores, Douglas
    Hernandez, Carlos
    PROCEEDINGS OF THE 2022 IEEE 40TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN), 2022,
  • [42] Image steganography with using QR code and cryptography
    Hajduk, Vladimir
    Broda, Martin
    Kovac, Ondrej
    Levicky, Dusan
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 350 - 353
  • [43] Secure data transmission for multibiometric identity verification systems using steganography and encryption
    Killioglu, Mehmet
    Taskiran, Murat
    Kahraman, Nihan
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2018, 24 (02): : 173 - 179
  • [44] Robust and secure file transmission through video streaming using steganography and blockchain
    Liang, Xiangning
    Kar, Pushpendu
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 24 (3-4) : 258 - 283
  • [45] Secure patients data transmission using XOR ciphering encryption and ECG steganography
    Patel, Shaheen S.
    Sankpal, S. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1311 - 1315
  • [46] Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
    Gokhale, Hrishikesh
    Satapathy, Chirag
    Syed, Ali Zoya
    INTERNET OF THINGS, GIOTS 2022, 2022, 13533 : 292 - 301
  • [47] Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography
    Pandey, Hari Mohan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 (111): : 213 - 225
  • [48] A novel approach in Steganography combining random key and substitution cipher
    Karthikeyan, B.
    Abbinaiya, V
    Sumathi, T.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 673 - 678
  • [49] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques
    Das, Ria
    Das, Indrajit
    2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301
  • [50] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163