Advanced Network Security using Cryptography and Steganography

被引:0
|
作者
Pandey, Jay Kumar [1 ]
Kushwaha, Amit [1 ]
Srivastava, Vibha [1 ]
机构
[1] NIEC, E&IE, Lucknow, Uttar Pradesh, India
关键词
Steganography; Cryptography; Symmetric key; Cipher;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields. They are used to protect e-mail messages, credit card information, corporate data, etc. In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system that able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. It is shown that such system is an effective steganographic one by making a comparison with the well known F5 algorithm and is also a theoretically unbreakable cryptographic one by demonstrating its equivalence to the Vernam Cipher.
引用
收藏
页码:326 / 331
页数:6
相关论文
共 50 条
  • [1] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608
  • [2] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [3] Implementation of cryptography in steganography for enhanced security
    Harianto Antonio
    P. W. C. Prasad
    Abeer Alsadoon
    [J]. Multimedia Tools and Applications, 2019, 78 : 32721 - 32734
  • [4] Implementation of cryptography in steganography for enhanced security
    Antonio, Harianto
    Prasad, P. W. C.
    Alsadoon, Abeer
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) : 32721 - 32734
  • [5] Multilayer Security Using RSA Cryptography and Dual Audio Steganography
    Bangera, Kripa N.
    Paddambail, Yashika
    Reddy, N. V. Subba
    Shivaprasad, G.
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 492 - 495
  • [6] Network Security Using Biometric and Cryptography
    Dutta, Sandip
    Kar, Avijit
    Mahanti, N. C.
    Chatterji, B. N.
    [J]. ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, PROCEEDINGS, 2008, 5259 : 38 - 44
  • [7] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [8] Analogy of Various DNA Based Security Algorithms Using Cryptography and Steganography
    Jain, Shipra
    Bhatnagar, Vishal
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 285 - 291
  • [9] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    Vijayakumar, P.
    Vijayalakshmi, V.
    Zayaraz, G.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (04) : 1221 - 1242
  • [10] Image security using steganography and cryptography with sweeping computational ghost imaging
    Research Institute for Applied Physics and Astronomy, University of Tabriz, Tabriz, Iran
    不详
    不详
    [J]. Front. Phys., 1600,