Advanced Network Security using Cryptography and Steganography

被引:0
|
作者
Pandey, Jay Kumar [1 ]
Kushwaha, Amit [1 ]
Srivastava, Vibha [1 ]
机构
[1] NIEC, E&IE, Lucknow, Uttar Pradesh, India
关键词
Steganography; Cryptography; Symmetric key; Cipher;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields. They are used to protect e-mail messages, credit card information, corporate data, etc. In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system that able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. It is shown that such system is an effective steganographic one by making a comparison with the well known F5 algorithm and is also a theoretically unbreakable cryptographic one by demonstrating its equivalence to the Vernam Cipher.
引用
收藏
页码:326 / 331
页数:6
相关论文
共 50 条
  • [21] Recent advances in multimedia information security: cryptography and steganography
    Abulkasim, Hussein
    Sun, Gengxin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 21865 - 21865
  • [22] Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
    Gladwin, S. Joseph
    Gowthami, Pasumarthi Lakshmi
    [J]. 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SIGNAL PROCESSING (AISP), 2020,
  • [23] Recent advances in multimedia information security: cryptography and steganography
    [J]. Multimedia Tools and Applications, 2023, 82 : 21865 - 21865
  • [24] Advanced technics to Shared & Protect Cloud Data using Multilayer Steganography and Cryptography
    Ranjan, Alok
    Bhonsle, Mansi
    [J]. 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 35 - 41
  • [25] PROVIDING NETWORK SECURITY BY USING THE STEGANOGRAPHY ON DIGITAL IMAGES
    Ergun, Fulden
    Kirsal Ever, Yoney
    [J]. 2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 360 - 364
  • [26] Multiple layer Text security using Variable block size Cryptography and Image Steganography
    Chauhan, Shivani
    Jyotsna
    Kumar, Janmejai
    Doegar, Amit
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [27] Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
    Prema, G.
    Natarajan, S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 727 - 730
  • [28] Security Plugin for Mozilla which Integrates Cryptography and Steganography Features
    Binu, P. K.
    Sreekutty, H. L.
    Sreekutty, V. S.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 101 - 106
  • [29] Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques
    Rani, M. Mary Shanthi
    Mary, G. Germine
    Euphrasia, K. Rosemary
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 403 - 412
  • [30] Cryptography and steganography
    [J]. 2018, Institute of Telecommunications Professionals (12):