Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Information Technology Journal
  Year: 2014 | Volume: 13 | Issue: 16 | Page No.: 2524-2533
DOI: 10.3923/itj.2014.2524.2533
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
Cryptic Cover for Covered Writing: A Pre-Layered Stego
Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Abstract:
Brobdingnagian may be the precise word for the usage of internet and advanced expertise in the globe in our day. Indeed, all sorts of this online communication go hand in hand with the so called major apprehension, information security. Since all kinds of digital files play an imperative role in internet operation, it is indispensable to defend the key features of private communication namely, seclusion, uprightness and legitimacy. This threat, in a roundabout way, has led to the breakthrough of information security rationales. Striking among these are Cryptography and Steganography, primordial skills pursued for the sake of secret sharing. The startling thing is that with the fruition of technology, these are giving prolific outcomes even now. Cryptography possesses such a litheness that its blend, in the company of other fields of study, facilitates offer much more options to explore security issues. This study envisions an inimitable approach to security in the context of encryption and embedding incorporating shuffling, chaotic equations in conjunction with Blowfish encryption algorithm. Here, encryption is performed on images followed by embedding secret data. The latter is done not literally but indirectly. This pitch endows with randomness and security with all the persuasive traits of encryption. Validation is given in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Relative Entropy (RE), entropy and correlation values. Experimental results are illustrated to vindicate the performance of this objective.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Steganography-Time to Time: A Review
  •    High Capacity Triple Plane Embedding: A Colour Stego
How to cite this article:

Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2014. Cryptic Cover for Covered Writing: A Pre-Layered Stego. Information Technology Journal, 13: 2524-2533.

DOI: 10.3923/itj.2014.2524.2533

URL: https://scialert.net/abstract/?doi=itj.2014.2524.2533

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

       

       

Curve Bottom