A Secure Triple Level Encryption Method Using Cryptography and Steganography

被引:0
|
作者
Usha, S. [1 ]
Kumar, G. A. Sathish [1 ]
Boopathybagan, K. [2 ]
机构
[1] Sri Venkateswara Coll Engn, Dept Elect & Commun Engn, Madras, Tamil Nadu, India
[2] Madras Inst Technol, Dept Elect & Instrumentat Engn, Madras, Tamil Nadu, India
关键词
Cryptography; Steganography; Image steganography; Reference matrix; Symmetric key algorithms;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is the practice for secure communication in the presence of third parties. Steganography is technique of writing hidden messages such that except the sender and receiver, no one even suspects the existence of the message. In today's hi-tech age, threats from intruders are very great such that usage of either of the above techniques separately may not be able to provide the intended protection. In order to increase the level of protection, both the techniques may be used in a combined manner. Multimedia techniques can also be used to hide the data. In this paper, we propose an encrypting system which combines techniques of cryptography and steganography with data hiding. Instead of using a single level of data encryption, the message is encrypted twice. Traditional techniques have been used for this purpose. Then the cipher is hidden inside the image in encrypted format for further use. It uses a reference matrix for selection of passwords depending on the properties of the image. The image with the hidden data is used for further purposes.
引用
收藏
页码:1017 / 1020
页数:4
相关论文
共 50 条
  • [1] Secure non real time image encryption algorithm development using cryptography & Steganography
    Mukhedkar, Moresh
    Powar, Prajkta
    Gaikwad, Peter
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [2] A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption
    Muhammad, Khan
    Ahmad, Jamil
    Farman, Haleem
    Jan, Zahoor
    Sajjad, Muhammad
    Baik, Sung Wook
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1938 - 1962
  • [3] Noble Method for Data Hiding using Steganography Discrete Wavelet Transformation and Cryptography Triple Data Encryption Standard: DES
    Rahmad, Cahya
    Prasetyo, Arief
    Arizki, Novriza
    Arai, Kohei
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 261 - 266
  • [4] Secure communication method based on encryption and steganography
    Duluta, Andrei
    Mocanu, Stefan
    Pietraru, Radu
    Merezeanu, Daniel
    Saru, Daniela
    [J]. 2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 453 - 458
  • [5] Using Highly Secure Data Encryption Method for Text File Cryptography
    Abu-Faraj, Mua'ad M.
    Alqadi, Ziad A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 53 - 60
  • [6] Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography
    Banik, Barnali Gupta
    Bandyopadhyay, Samir Kumar
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1147 - 1152
  • [7] An Encryption based on DNA cryptography and Steganography
    Sajisha, K. S.
    Mathew, Sheena
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 162 - 167
  • [8] AN EFFICIENT STEGANOGRAPHY ALGORITHM USING VISUAL CRYPTOGRAPHY AND AES ENCRYPTION
    Andi, Velumurugan
    Edeswaran, Logashanmugam
    [J]. IIOAB JOURNAL, 2016, 7 (10) : 22 - 25
  • [9] An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission
    Sriram, S.
    Karthikeyan, B.
    Vaithiyanathan, V.
    Raj, Anishin M. M.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 127 - 130
  • [10] SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
    Abood, May Hattim
    Taha, Zahraa Khudhair
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1434 - 1450