Research Article | Open Access | Download PDF
Volume 4 | Issue 7 | Year 2013 | Article Id. IJCTT-V4I7P176 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I7P176
Advance Cryptography Scheme for Data Hiding using Advance Hill cipher DES
Gurtaptish Kaur, Sheenam Malhotra
Citation :
Gurtaptish Kaur, Sheenam Malhotra, "Advance Cryptography Scheme for Data Hiding using Advance Hill cipher DES," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 7, pp. 2383-2387, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I7P176
Abstract
Cryptography is a scheme that used to increase security in most of the fields. Security is mandatory where we discuss about the confidential information. As with know, the use of internet rises, most of organizations transfer their confidential information through internet which is not fully secure and there is a chance of data loss or unauthorized access. In this work, we proposed an advance technique to hide secret text data in image file that it can’t be lost or accessed by malicious user. In this proposed technique, we use advance hill cipher and DES to enhance the security level which can be measured by some measuring factors. The result of this work shows that this advance hybrid scheme gives better results than previous techniques.
Keywords
Security, Data hiding, Cryptography, Hill-cipher++, DES.
References
[1] P. Elayaraja and M. Sivakumar , “New Approach and Additional Security to Existing Cryptography Using Cubical Combinatorics”.
[2] Neetu Settia ,“Cryptanalysis of Modern Cryptographic Algorithms” Vol. 1, Issue 2, December, 2010
[3] Anders Larsson, “Cryptography”, A personal project in the course TDDD55 By Anders 760903-7192.
[4] Yousuf Ibrahim Khan, Saad Mahmud Sonyy, S.M. Musfequr Rahman ,“Image based Cryptography from a distance”
[5] Ramchandra S. Mangrulkar1, Pallavi V. Chavan2,"Encrypting Informative Image by Key Image using Hill Cipher Technique" International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May, 2009.
[6] Ruisong Ye,Wei Zhou, “An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice” ,International Journal of Information and Communication Technology Research, Department of Mathematics, Shantou University Shantou, Guangdong,China ,Volume 1, No. 8, December, 2011.
[7] Xiaoyi Zhou*1,2, Jixin Ma2, , Yongzhe Zhao, Ergodic Matrix and Hybrid-key Based Image Cryptosystem” Computer Science and Technology School, Jilin University, Changchun, Jilin, China, June, 2011.
[8] Mao, Y. B., Chen, G., Lian, S. G.,” A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos ,14, 613--3624 ,2004.
[9] Y. Rangel-Romero, G. Vega-García, A. Menchaca-Méndez, D. Acoltzi-Cervantes, L. Martínez-Ramos, M. Mecate-Zambrano, F. Montalvo-Lezama, J. Barrón-Vidales, N. Cortez-Duarte and F. Rodríguez-Henríquez, “Comments on How to repair the Hill cipher”, Journal of Zhejiang University Science A, vol. 9, no. 2, (2006), pp. 211-214.
[10] A. H. Rushdi and F. Mousa, “Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher”, Int’l Journal of Computer Science and Network Security, vol. 9, no. 5, (2009), pp. 11-16.
[11] D. R. Stinson, “Cryptography Theory and Practice”, 3rd edition. Chapman & Hall/CRC, (2006), pp. 13-37.
[12] A. Bibhudendra, K. P. Saroj, K. P. Sarat and P. Ganapati, “Image Encryption using Advanced Hill Cipher Algorithm”, International Journal of Recent Trends in Engineering, vol. 1, no. 1, (2009), pp. 663-667.
[13] I. E. Ziedan, M. M. Fouad and D. H. Salem, “Application of data encryption standard to bitmap and JPEG images”, in Proc. 12th National Radio Science conference, Cairo, (2003), pp. 1-8.
[14] M. Toorani and A. Falahati, “A Secure Variant of the Hill Cipher”, in Proc. 14th IEEE Symposium on Computers and Communications, Sousse, (2009), pp. 313-316.
[15] Mohsen Toorani, Abolfazl Falahati , “A Secure Cryptosystem based on Affine Transformation,” Journal of Security and Communication Networks, Vol. 4, No. 2, pp. 207-215, Feb. 2011.