An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission

被引:0
|
作者
Sriram, S. [1 ]
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Raj, Anishin M. M. [2 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur, India
[2] Viswajyothi Coll Engn & Technol, Ernakulam, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2015年
关键词
Steganography; Cryptography; Rotor cipher; Data Hiding; LSB Steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [31] Secure Data Transmission Using Quantum Cryptography in Fog Computing
    Mangla, Cherry
    Rani, Shalli
    Atiglah, Henry Kwame
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information
    Mustafa, Ghulam
    Ashraf, Rehan
    Ul Haq, Inam
    Khalid, Yusra
    Ul Islam, Rafiq
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED), 2019,
  • [33] Cryptography: A new approach of classical hill cipher
    Rahman, M.N.A. (mohdnabd@unisza.edu.my), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia (07):
  • [34] A novel approach for dual layer security of message using Steganography and Cryptography
    Bansal, Reena
    Badal, Neelendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (15) : 20669 - 20684
  • [35] Cryptography: A New Approach of Classical Hill Cipher
    Rahman, M. Nordin A.
    Abidin, A. F. A.
    Yusof, Mohd Kamir
    Usop, N. S. M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 179 - 190
  • [36] A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
    Namasudra, Suyel
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [37] A New Approach for Data Security in Cryptography and Steganography
    Guttikonda, Prashanti
    Kaviti, Sandhya Rani
    Popuri, Ashok Kumar
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 35 - 44
  • [38] A High Secure Speech Transmission Using Audio Steganography and Duffing Oscillator
    Abbas Salman Hameed
    Wireless Personal Communications, 2021, 120 : 499 - 513
  • [39] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [40] A High Secure Speech Transmission Using Audio Steganography and Duffing Oscillator
    Hameed, Abbas Salman
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 499 - 513