Secured Transmission of Text using Double Encryption Algorithms
Citation
Mahanth Landu, Sujatha C.N "Secured Transmission of Text using Double Encryption Algorithms", International Journal of Engineering Trends and Technology (IJETT), V49(5),310-316 July 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
This Paper discusses how a text file is to be kept secret while transmitting from sender to receiver. This paper is intended to present the techniques for encryption and Steganography. Steganography is the practice of concealing messages or information in host data or text or an image. There are many different carrier file formats, but digital images are the most popular as their frequency of occurrence is more on the internet. Steganography is an improved method of securing message than cryptography that solely conceals the content of the message not the existence of the message. Steganography is a tool which allows furtive transmission of information over the communication channel. Combining the secret message with the carrier image provides the Stego image. In this paper, double coding algorithms are accustomed hide the encrypted text in a host image that makes the secret message is difficult to detect without retrieval. This paper presents a technique which could transmit with high security.
Reference
[1] Ekwe A.O, Okonba B.J, “Cryptography: A Useful and Widely Used Tool in Todays’s Engineering Security”, International Journal of Engineering Trends and Technology, Volume 12, No.4, June 2014, pp.196-198.
[2] T.Morkel, J.H.P Eloff, M.S. Oliver, "An overview of image steganography", Information and Computer security Architecture Research group, Annual Information Security South Africa Conference, July 2005.
[3] Arvind kumar, KM. Pooja, " Steganography- A data Hiding Technique," International Journal of Computer Applications, Volume 9, No.7, November 2010, pp.19-23.
[4] Y.Manjula, K.B.Shiva kumar, "Enhanced Secure Image Steganography using Double Encryption Algorithms," International Conference on Computing for Sustainable Global Development, IEEE 2016, pp.705-708.
[5] Xinyi Zhou, Wei Gong, Wen Long Fu, Lian Jing Jin, "An Improved Method for LSB Based Color Image Steganography combined with Cryptography", International Conference on Computer and Information Science, IEEE 2016,pp.1-4.
[6] D.Coppersmith, "The Data Encryption Standard(DES) and its strength against attacks", IBM J.RES. Develop. Volume 38 No. 3,May 1994, pp.243-250
[7] A.Shamir, R.L. Rivest, L.Adleman, "A method for Obtaining Digital Signatures and Public key Cryptosystems," Communications of the ACM(1978) , pp.120-126.
[8] Navneet Kaur,Sunny Behal," A survey on various types of Steganography and Analysis of Hiding Techniques," International Journal of Engineering Trends and Technology, Volume 11, No.8, May 2014, pp.388-392.
[9] Neha Rani, Jyothi Chaudhary, “Text Steganography: A Review”, International Journal of Engineering Trends and Technology, Volume 4, Issue 7, July 2013, pp.3013-3015.
[10] Beenish Mehboob, Rashid Aziz Faruqui, "A Steganography Implementation", International Symposium on Biometrics and Security Technologies, IEEE 2008,pp.1-5.
[11] Shaveta Mahajan, Arpinder singh, "A Review of Methods and Approach for Secure Steganography", Indian Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, October 2012, pp.67-70.
[12] Sudhanshi Sharma, Umesh Kumar, "Review of Transform Domain Techniques for Image Steganography", International Journal of Science and Research, Volume 4, Issue 5, May 2015, pp.194-197.
[13] Wang. H, Wang. S, "Cyber warfare: Steganography vs Steganalysis", Communications of ACM, -Volume 47 No.10, October 2004, pp.76-82.
[14] V.Lokeswara Reddy, Dr.A.Subramanyam, Dr.P.Chenna Reddy, "Implementation of LSB steganography and its evaluation for various file formats", International Journal of Advanced Networking Applications, Volume 2, Issue 5, April 2011, pp.868-872.
[15] Kamaldeep Joshi, Pooja Dhankar, Rajkumar Yadav, "A New Image Steganography Method in Spatial Domain using XOR", Annual IEEE India Conference, IEEE 2015,pp.1-6
[16] Sri Devi, Manajaih.D.H, "Modular Arithmetic in RSA cryptography," International Journal Of Advanced Computer research, Volume4, No. 4, Issue-17, December-2014, pp-973-978
[17] Sung-Jo Han, Heang-Soo Oh, Jongan Park, "The improved Data Encryption Standard (DES) Algorithm", Department of Electronic Engineering, Chousan University, South Korea. IEEE 1996 pp.1310-1314.
[18] Ali Mir Arif Mir Asif, Shaikh Abdul Hannan, “A Reviwe on Classical and Modern Encryption Techniques”, International Journal of Engineering Trends and Technology, Volume 12, No.4, June 2014, pp.199-203.
[19] Afaq Ahmad, Sayyid Samir Al-Bursaidi, Mufeed Juma Al-Musharafi, " On Properties of PN Sequences generated by LFSR- a Generalized study and Simulation Modeling", Indian Journal of Science and Technology, Volume 6, Issue 10, October 2013, pp.5351-5358.
[20] Rupendra kumar Pathak, Shweta Meena, "LSB Based Image Steganography Using PN Sequence & GCD Transform", International Conference on Computational Intelligence and Computer Research, IEEE 2015, pp.1-5.
Keywords
Cryptography, Lower bit insertion, Private key, Pseudo Noise, Public key, Steganography.