A Secure Triple Level Encryption Method Using Cryptography and Steganography

被引:0
|
作者
Usha, S. [1 ]
Kumar, G. A. Sathish [1 ]
Boopathybagan, K. [2 ]
机构
[1] Sri Venkateswara Coll Engn, Dept Elect & Commun Engn, Madras, Tamil Nadu, India
[2] Madras Inst Technol, Dept Elect & Instrumentat Engn, Madras, Tamil Nadu, India
关键词
Cryptography; Steganography; Image steganography; Reference matrix; Symmetric key algorithms;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is the practice for secure communication in the presence of third parties. Steganography is technique of writing hidden messages such that except the sender and receiver, no one even suspects the existence of the message. In today's hi-tech age, threats from intruders are very great such that usage of either of the above techniques separately may not be able to provide the intended protection. In order to increase the level of protection, both the techniques may be used in a combined manner. Multimedia techniques can also be used to hide the data. In this paper, we propose an encrypting system which combines techniques of cryptography and steganography with data hiding. Instead of using a single level of data encryption, the message is encrypted twice. Traditional techniques have been used for this purpose. Then the cipher is hidden inside the image in encrypted format for further use. It uses a reference matrix for selection of passwords depending on the properties of the image. The image with the hidden data is used for further purposes.
引用
收藏
页码:1017 / 1020
页数:4
相关论文
共 50 条
  • [41] A multi-level steganography mechanism using quantum chaos encryption
    Sangeeta Dhall
    Rinku Sharma
    Shailender Gupta
    [J]. Multimedia Tools and Applications, 2020, 79 : 1987 - 2012
  • [42] A secure image protection algorithm by steganography and encryption using the 2D-TSCC
    李琦
    王兴元
    王赫
    叶晓林
    周双
    高锁
    施云庆
    [J]. Chinese Physics B, 2021, 30 (11) : 149 - 160
  • [43] A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    Li, Qi
    Wang, Xingyuan
    Wang, He
    Ye, Xiaolin
    Zhou, Shuang
    Gao, Suo
    Shi, Yunqing
    [J]. CHINESE PHYSICS B, 2021, 30 (11)
  • [44] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [45] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Shehzad Ashraf Chaudhry
    Mohammad Sabzinejad Farash
    Husnain Naqvi
    Muhammad Sher
    [J]. Electronic Commerce Research, 2016, 16 : 113 - 139
  • [46] An Efficient Method for text Encryption using Elliptic Curve Cryptography
    Das, Prasenjit
    Giri, Chandan
    [J]. PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 96 - 101
  • [47] A Random Selective Block Encryption Technique for Secure Image Cryptography Using Blowfish Algorithm
    Kaur, Amandeep
    Singh, Gurjeet
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1290 - 1293
  • [48] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [49] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    [J]. ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [50] Image steganography with using QR code and cryptography
    Hajduk, Vladimir
    Broda, Martin
    Kovac, Ondrej
    Levicky, Dusan
    [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 350 - 353