An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission

被引:0
|
作者
Sriram, S. [1 ]
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Raj, Anishin M. M. [2 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur, India
[2] Viswajyothi Coll Engn & Technol, Ernakulam, India
关键词
Steganography; Cryptography; Rotor cipher; Data Hiding; LSB Steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [1] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [2] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [3] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 130 : 551 - 578
  • [4] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (01) : 551 - 578
  • [5] Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Batool, Ishrat
    Arif, Muhammad
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 179 - 188
  • [6] A Secure IoT System Using Quantum Cryptography with Block Cipher
    Abdulkader, Zaid A.
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2021, 24 (05): : 771 - 776
  • [7] A Secure Data Transmission Approach Using B plus trees In Steganography
    Shelare, Tanushree
    Powar, Varsha
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 947 - 951
  • [8] A Secure Triple Level Encryption Method Using Cryptography and Steganography
    Usha, S.
    Kumar, G. A. Sathish
    Boopathybagan, K.
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1017 - 1020
  • [9] SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
    Abood, May Hattim
    Taha, Zahraa Khudhair
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1434 - 1450
  • [10] A Real Time Approach for Secure Text Transmission Using Video Cryptography
    Metaliya, Viral G.
    Jain, Deepak Kumar
    Ravin, Sardhara
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 635 - 638