An Effective Approach to Information Hiding for Secure Message Transmission

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - June Issue 2013 by IJCTT Journal
Volume-4 Issue-6                           
Year of Publication : 2013
Authors :Manoj Kumar Sharma, Vishal Shrivastav

MLA

Manoj Kumar Sharma, Vishal Shrivastav "An Effective Approach to Information Hiding for Secure Message Transmission"International Journal of Computer Trends and Technology (IJCTT),V4(6):1543-1551 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - The network security is becoming more important as the amount of data being exchanged on the Internet is increasing. Security requirements are necessary both at the final user level and at the enterprise level, especially since the massive utilization of personal computers, networks, and the Internet with its global availability.. Steganography play an important role for secure communication in network security. When we combine the property of steganography with cryptography, we can achieve more secure complex system. This paper work proposed a frame work for secure message communication, it uses multilevel security techniques for securing secret data as well as provision for user authentication and control eavesdropping. This paper also gives comparative study with current techniques.

 

References-
[1] C. Kurak and J. McHugh, “A Cautionary Note On Image Downgrading,” Proc Eighth Ann. Computer Security Applications Conf., pp.153-159, 1992.
[2] William Stalli, Cryptography and Network Security Principles and Practices,4th edition,Prentice Hall, 2005.
[3] Abbas Cheddad, Joan Condell, Kevin Curran, paul Mc Kevitt, “Digital image steganography:Survey and analysis of current methods”, Signal Processing 90(3) pp.727-752, 2010.
[4] F. A. P. Petitcolas, R. J. Anderson & M. G. Kuhn, “Information Hiding – A Survey”, IEEE Journal of special issue on protection of multimedia content, 87(7), pp. 1062- 1078, July 1999.
[5]Alain C. Brainos II on “A Study of Steganography and the Art of Hiding Information”, East Carolina University. Page No. 104-115
[6]Dean Lewandowski, Mike Palmisano on “Steganography”
[7]Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn on “Information Hiding A Survey” special issue on protection of multimedia content, 87(7): Page No.1062-1078, July 1999.
[8]Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir Memon on “Image Steganography and Steganalysis: Concepts and Practice” Springer-Verlag Berlin Heidelberg 2004 Page No. 204-211. [9]Madhurendra Kumar on “Image Authentication Techniques”, August 2008 Page No. 10-13

Keywords —TCP, Congestion Control Mechanisms.