Secret Data Transmission using Vital Image Steganography over Transposition Cipher

被引:0
|
作者
Jain, Mamta [1 ]
Lenka, Saroj Kumar [1 ]
机构
[1] Mody Univ Sci & Technol, Dept Informat Technol, Laxmangarh, Rajasthan, India
关键词
LSB; steganography; cryptography; Vernam cipher; encryption; decryption; embedding;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The idea behind this paper describes a modality about secret interface over the globalization of the communication over the world. To accomplish this phenomenon, two varieties of security mechanism, cryptography and steganography is being applied. At the former stage, encryption is being provided to secret plain text using Vernam cipher (One-Time Pad) transposition technique, since Vernam cipher show good performance metrics in terms of less CPU running time, file size same after encryption and strong avalanche effect compare with all transposition cipher. And at the later stage, it transform cipher text into bytes and divides each byte into pairs of bits and assigns the decimal values to each pairs, which is known as master variable. master variable value range will be vary between 0 to 3. Depending upon the master patchy value, add that cipher text in the career image at Least Significant Bit (LSB) 6 th and 7 th bit location or 7 th and 8 th bit location or 7 th and 6 th or 8 th and 7 th bit location. Which shows the embedding location dynamicity of the algorithm depends upon dynamically changed master variable value. After completion of embedding and sending the stego image to the receiver side, retrieving process of the cipher text from the said locations will be done. And then decryption process to get the secret plain text back will be performed using the Vernam cipher transposition algorithms. In this we provide robust image steganography. Performance analysis observed using MSE and PSNR value.
引用
收藏
页码:1026 / 1029
页数:4
相关论文
共 50 条
  • [1] Secret data transmission using advance steganography and image compression
    Pandey, Digvijay
    Wairya, Subodh
    Mandawi, Raghda Salam Ai
    Najim, Saif Al-din M.
    Khalaf, Haitham Abbas
    Al-Barzinji, Shokhan M.
    Obaid, Ahmed J.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1243 - 1257
  • [2] Image steganography for securing secret data using hybrid hiding model
    Sumeet Kaur
    Savina Bansal
    Rakesh Kumar Bansal
    Multimedia Tools and Applications, 2021, 80 : 7749 - 7769
  • [3] Randomly Hiding Secret Data using Dynamic Programming for Image Steganography
    Khandelwal, Pulkit
    Bisht, Neha
    Thanikaiselvan, V
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 777 - 783
  • [4] Image steganography for securing secret data using hybrid hiding model
    Kaur, Sumeet
    Bansal, Savina
    Bansal, Rakesh Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) : 7749 - 7769
  • [5] A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography
    Swain, Gandharba
    Lenka, Saroj Kumar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 1 - 12
  • [6] A technique for secret communication using a new block cipher with dynamic steganography
    Swain, G. (gswain1234@gmail.com), 2012, Science and Engineering Research Support Society, Room 402, Man-Je Bld., 449-8, Ojung-Dong, Daedoek-Gu, Korea, Republic of (06):
  • [7] A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography
    Swain, Gandharba
    Lenka, Saroj Kumar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 13 - 24
  • [8] An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission
    Sriram, S.
    Karthikeyan, B.
    Vaithiyanathan, V.
    Raj, Anishin M. M.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 127 - 130
  • [9] Vibrant color image steganography using channel differences and secret data distribution
    Parvez, Mohammad Tanvir
    Gutub, Adnan Abdul-Aziz
    KUWAIT JOURNAL OF SCIENCE & ENGINEERING, 2011, 38 (1B): : 127 - 142
  • [10] Highly Randomized Image Steganography using Secret Keys
    Dagar, Sunny
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,