An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission

被引:0
|
作者
Sriram, S. [1 ]
Karthikeyan, B. [1 ]
Vaithiyanathan, V. [1 ]
Raj, Anishin M. M. [2 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur, India
[2] Viswajyothi Coll Engn & Technol, Ernakulam, India
关键词
Steganography; Cryptography; Rotor cipher; Data Hiding; LSB Steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [41] Hybrid robust image steganography approach for the secure transmission of biomedical images in cloud
    Arunkumar S.
    Subramaniyaswamy V.
    Logesh R.
    EAI Endorsed Transactions on Pervasive Health and Technology, 2019, 5 (18)
  • [42] An enhanced Hill cipher approach for image encryption in steganography
    Karthikeyan, B.
    Chakravarthy, Jagannathan
    Vaithiyanathan, V.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 178 - 187
  • [43] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [44] A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography
    Sharma, Nagesh
    Rathi, Rakesh
    Jain, Vinesh
    Saifi, Mohd. Waseem
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [45] Novel Approach for Secure Cover File of Hidden Data in the Unused Area within EXE File Using Computation between Cryptography and Steganography
    Naji, A. W.
    Zaidan, A. A.
    Zaidan, B. B.
    Hameed, Shihab A.
    Khalifa, Othman O.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (05): : 294 - 300
  • [46] Optical scanning cryptography for secure wireless transmission
    Poon, TC
    Kim, T
    Doh, K
    APPLIED OPTICS, 2003, 42 (32) : 6496 - 6503
  • [47] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [48] Image steganography with using QR code and cryptography
    Hajduk, Vladimir
    Broda, Martin
    Kovac, Ondrej
    Levicky, Dusan
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 350 - 353
  • [49] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608
  • [50] Cryptography model to secure IoT device endpoints, based on polymorphic cipher OTP
    Bran, Carlos
    Flores, Douglas
    Hernandez, Carlos
    PROCEEDINGS OF THE 2022 IEEE 40TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN), 2022,