Secret Data Transmission using Vital Image Steganography over Transposition Cipher

被引:0
作者
Jain, Mamta [1 ]
Lenka, Saroj Kumar [1 ]
机构
[1] Mody Univ Sci & Technol, Dept Informat Technol, Laxmangarh, Rajasthan, India
来源
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) | 2015年
关键词
LSB; steganography; cryptography; Vernam cipher; encryption; decryption; embedding;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The idea behind this paper describes a modality about secret interface over the globalization of the communication over the world. To accomplish this phenomenon, two varieties of security mechanism, cryptography and steganography is being applied. At the former stage, encryption is being provided to secret plain text using Vernam cipher (One-Time Pad) transposition technique, since Vernam cipher show good performance metrics in terms of less CPU running time, file size same after encryption and strong avalanche effect compare with all transposition cipher. And at the later stage, it transform cipher text into bytes and divides each byte into pairs of bits and assigns the decimal values to each pairs, which is known as master variable. master variable value range will be vary between 0 to 3. Depending upon the master patchy value, add that cipher text in the career image at Least Significant Bit (LSB) 6 th and 7 th bit location or 7 th and 8 th bit location or 7 th and 6 th or 8 th and 7 th bit location. Which shows the embedding location dynamicity of the algorithm depends upon dynamically changed master variable value. After completion of embedding and sending the stego image to the receiver side, retrieving process of the cipher text from the said locations will be done. And then decryption process to get the secret plain text back will be performed using the Vernam cipher transposition algorithms. In this we provide robust image steganography. Performance analysis observed using MSE and PSNR value.
引用
收藏
页码:1026 / 1029
页数:4
相关论文
共 12 条
  • [1] On the limits of steganography
    Anderson, RJ
    Petitcolas, FAP
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
  • [2] Gutte R.S., 2013, ICTACT J COMMUNICATI, V4, P685
  • [3] Islam M. R., 2014, IEEE C INF EL VIS
  • [4] Li B, 2011, J. Inf. Hiding Multim. Signal Process., V2, P142
  • [5] Maiti Chandreyee, 2011, DATA HIDING IMAGES U, P195, DOI [10.1007/978-3-642- 27183- 0_21, DOI 10.1007/978-3-642-27183-0_21]
  • [6] Nag A, 2011, COMM COM INF SC, V191, P620
  • [7] PADMAPRIYA S, 2012, INT J COMPUTER SCI T, V3, P1202
  • [8] Swain G., 2011, IEEE T IMAGE PROCESS, P84
  • [9] Swain G., 2010, IJCCT, V2
  • [10] A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher
    Swain, Gandharba
    Lenka, Saroj Kumar
    [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 842 - +