Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Information Technology Journal
Year: 2014  |  Volume: 13  |  Issue: 16  |  Page No.: 2524 - 2533

Cryptic Cover for Covered Writing: A Pre-Layered Stego

Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan    

Abstract: Brobdingnagian may be the precise word for the usage of internet and advanced expertise in the globe in our day. Indeed, all sorts of this online communication go hand in hand with the so called major apprehension, information security. Since all kinds of digital files play an imperative role in internet operation, it is indispensable to defend the key features of private communication namely, seclusion, uprightness and legitimacy. This threat, in a roundabout way, has led to the breakthrough of information security rationales. Striking among these are Cryptography and Steganography, primordial skills pursued for the sake of secret sharing. The startling thing is that with the fruition of technology, these are giving prolific outcomes even now. Cryptography possesses such a litheness that its blend, in the company of other fields of study, facilitates offer much more options to explore security issues. This study envisions an inimitable approach to security in the context of encryption and embedding incorporating shuffling, chaotic equations in conjunction with Blowfish encryption algorithm. Here, encryption is performed on images followed by embedding secret data. The latter is done not literally but indirectly. This pitch endows with randomness and security with all the persuasive traits of encryption. Validation is given in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Relative Entropy (RE), entropy and correlation values. Experimental results are illustrated to vindicate the performance of this objective.

Cited References   |    Fulltext    |   Related Articles   |   Back
 
 
   
 
 
 
  Related Articles

 
 
 
 
 
 
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility