High Level Secure Messages Based On Steganography And Cryptography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-2
Year of Publication : 2020
Authors : S.Jagadeesan, C.Mani, R.Navin Kumar, S.Prabhakaran
DOI :  10.14445/22315381/IJETT-V68I2P220S

Citation 

MLA Style: S.Jagadeesan, C.Mani, R.Navin Kumar, S.Prabhakaran  "High Level Secure Messages Based On Steganography And Cryptography" International Journal of Engineering Trends and Technology 68.2 (2020):142-145.

APA Style:S.Jagadeesan, C.Mani, R.Navin Kumar, S.Prabhakaran. High Level Secure Messages Based On Steganography And Cryptography  International Journal of Engineering Trends and Technology, 68(2),142-145.

Abstract
Steganography and cryptography are very important techniques utilized in information security to cover and secure secret messages in transmitted information. This paper can introduce, implement and take a look at a unique methodology which may be used as a secure and extremely economical method {of information|of knowledge|} activity as well as data extracting. Some potency parameters are going to be through an experiment obtained and compared with alternative existing ways parameters to prove the potency of the planned methodology.

Reference

[1] A. A. Moustafa, Z. A. Alqadi, “Color Image Reconstruction Using A New R`G`I Model”, Journal of Computer Science, Vol. 5, No. 4, pp-250 - 254, 2009
[2] S.Jagadeesan, “Steganography Using Genetic Algorithm Along with Visual Cryptography for Mobile Environment Applications”, CIIT Journal of Wireless Communications, Vol.7, No-9,pp-0974-9756,2015.
[3] K Matrouk, A Al-Hasanat, H Alasha`ary, Z. Al-Qadi, H Al- Shalabi,“ Speech fingerprint to identify isolated word person”, World Applied Sciences Journal, Vol. 31, No. 10, pp. 1767-1771, 2014
[4] J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, “A Novel zero-error method to create a secret tag for an image”, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018
[5] M. Jose, “Hiding Image in Image Using LSB Insertion Method with ImprovedSecurity and Quality”, International Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014
[6] R. M. Patel, D. J. Shah, “Conceal gram :Digital image in image using LSB insertion method”, International Journal of Electronics and Communication Engineering & Technology, Vol. 4, No. 1, pp. 230- 2035, 2013
[7] J. Nadir, Z. Alqadi, A. Abu Ein, “Classification of Matrix Multiplication, Methods Used to Encrypt-decrypt Color Image”, International Journal of Computer and Information Technology, Vol. 5,No. 5, pp. 459-464, 2016
[8] R. C. Gonzalez, R. Elwood, “Digital Image Processing”, Addison-Wesley,New York, 1992
[9] J. N. Abdel-Jalil, “Performance analysis of color image encryption/decryption techniques”, International Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016
[10] T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013
[11] H. Gao, Y. Zhang, S. Liang, D. Li, “A New Chaotic Algorithm for Image Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393- 399, 2006
[12] G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos, Solitons and Fractals, Vol. 21,No. 3, pp.749-761, 2004
[13] K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik`s Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, ArticleID 173931, 2011
[14] Wang, J. Zhang, “An Image Scrambling Encryption using Chaos-controlled Poker Shuffle Operation”, IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April
[15] T.Satish Vijay Rajeev, Gousiya Begum, “Threshold Cryptosystem Mining of Association Rules using Horizontal Distributed Database”, IJETT-International Journal of Computer Science and Engineering(IJETT-IJCSE) Volume 3 Issue 3 2017.

Keywords
steganography; cryptography time; MSE; cyptography; cryptography time; speedup; PSNR