Research Article | Open Access | Download PDF
Volume 4 | Issue 8 | Year 2013 | Article Id. IJCTT-V4I8P196 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I8P196
A Hybrid Approach for Data Hiding using Cryptography Schemes
Gurtaptish Kaur, Sheenam Malhotra
Citation :
Gurtaptish Kaur, Sheenam Malhotra, "A Hybrid Approach for Data Hiding using Cryptography Schemes," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 8, pp. 2917-2923, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I8P196
Abstract
The use of internet increases for communication and for other more aspects. There are number of Cryptography scheme that used to increase security where we discuss about the confidential information transfer. As unauthorized access & data loss increases so, in this work we proposed a hybrid approach to hide secret data in other file that it can’t be lost or accessed by unauthorized user. This hybrid technique can be proposed by using advance hill cipher and DES to enhance the security which can be measured by calculating PSNR & MSE values. This technique is a new technique for hiding text data behind the image file and increase the security.
Keywords
Cryptography, Data hiding, Encryption, Security.
References
[1] Elayaaraja and M.Sivakumar, “Securing data using 4 variables linear block cipher Asymmetric key Algorithm”, International Journal of Computers and Distributed www.ijcdsonline.com Vol.1, Issue 3, October 2011.
[2] Devendra Kumar Malakar, Prof. Dineshchandra Jain, “The Problem Analysis on Encryption Techniques in Cryptography”, International Journal of Societal Applications of Computer Science, Vol.2 , Issue 5 ,May 2012.
[3] A. Bagherzandi, M. Salmasizadeh, and J. Mohajeri, “A related key attack on the feistel type block ciphers," International Journal of Network Security, Vol. 4 No 4,issue 2,2010.
[4] L. Sreenivasulu Reddy “A New Modal of Hill Cipher Using Non- quadratic Residues”, International Journal of Soft Computing and Engineering,, Vol.2, Issue-2, May 2012.
[5] V. Umakanta Sastry, N. Ravi Shankar, “A Modified Hill Cipher Involving Interweaving and Iteration”, International Journal of Network Security , Vol. 4, pp .11-16, July 2010.
[6] Mohsen Toorani, Abolfazl Falahati , “A Secure Cryptosystem based on Affine Transformation,” Journal of Security and Communication Networks, Vol. 4,Issue 2, pp. 207-215, Feb. 2011.
[7] O.Y. Chuan and M.R.K. Ariffin,” A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes”, Journal of Computer Science, Department Computer Science, Faculty of Informatics, University,Vol.7, Issue No.2,pp.785-789,2011.
[8] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrah, “ Novel Methods of Generating Self-Invertible Matrix for Hill ,Cipher Algorithm”, International Journal of Security (CSC Journals), Vol. 4, Issue 1, pp. 14-21, 2007.
[9] Adi Narayana Reddy Ka, Vishnuvardhan B,” Generalized Affine Transformation Based on circulate Matrices” ,Department of CSE, Hyderabad Institute of Technology and Management, Hyderabad, Vol, 5,Issue 5,pp.332-335,2012.
[10] A. H. Rushdi and F. Mousa, “Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher”, International Journal of Computer Science and Network Security, Vol.5, Issue 5, pp. 11-16, 2009.
[12] A. Bibhudendra, K. P. Saroj, K. P. Sarat and P. Ganapati, “Image Encryption using Advanced Hill Cipher Algorithm”, International Journal of Recent Trends in Engineering, Vol. 1, Issue 1, pp. 663-667,2009.
[13] I. E. Ziedan, M. M. Fouad and D. H. Salem, “Application of data encryption standard to bitmap and JPEG images”, in Proc. 12th National Radio Science conference, Cairo in Hyderabad, pp. 1-8, 2003.
[14] Sanagurunathan, V.Rajendran and Dr.T.Purusothaman ,” Classification of Substitution Ciphers using Neural Networks”, International Journal of Computer Science and Network Security, Vol.10,Issue.3, March 2010.
[15] G. Usha Devi , Ipsita Rana, Sutanu Nandi,” Multilevel Encryption System using Graceful Codes” ,International journal of advanced research in Computer Science and Software Engineering, Vol. 2, Issue 3, pp-438-440,March 2012.
[16] Jeffrey Overbev, William Travels and Jerzy Wojdylo,” On the Key space of the Hill Cipher, Cryptology”, International journal of science computer ,Vol.2,pp 59–72, January 2005.
[17] Krishna A.V.N, S.N.N.Pandit, A.Vinaya Babu,” A generalized scheme for data encryption technique using a randomized matrix key”, International Journal of Discrete Mathematical Sciences, Vol. 10,Issue 1, pp 73-81, Feb 2007.
[18] L.Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, “An efficient Protocol for Authenticated Key Agreement,” Journal of Designs, Codes and Cryptography, Department of Computer Security ,Vol.2, pp.119-134, 2003.
[19] M. Nordin A. Rahman, N. S. M. Usop” Cryptography: A New Approach of Classical Hill Cipher” ,International Journal of Security and Its Applications Vol. 7, March 2013.
[20] P. Lin, W. L. Wu, C. K. Wu, “Security analysis of double length compression function based on block cipher," International Journal of Network Security, Vol. 4, pp. 121-127, 2007.
[21] Ram Chandra S. Mangrulkar1, Pallavi V. Chavan2,"Encrypting Informative Image by Key Image using Hill Cipher Technique" International Journal of Recent Trends in Engineering, Vol. 1, Issue 1, May, 2009.S
[22] Ruisong Ye Wei Zhou, “An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice” ,International Journal of Information and Communication Technology Research, Department of Mathematics, Shantou University Shantou Guangdong ,China ,Vol. 1, Issue 8, December, 2011.
[23] V. U. K. Sastary and V. Janaki, “A modified hill cipher with multiple keys," International Journal of Computational Science, Vol. 2,Issue 2, pp. 815-826, 2008.
[24] Y. 8. Kurniawan, A. S. A., M. S. Mardiyanto, I. S. S.,and S. Sutikno,,”The new block cipher: BC2," International Journal of Network Security, Vol. 8, Issue1, pp. 16-24, 2009.