Research Article

Article:Security Enhancement: Combining Cryptography and Steganography

by  Dhawal Seth, L. Ramanathan, Abhishek Pandey
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Issue 11
Published: November 2010
Authors: Dhawal Seth, L. Ramanathan, Abhishek Pandey
10.5120/1433-1932
PDF

Dhawal Seth, L. Ramanathan, Abhishek Pandey . Article:Security Enhancement: Combining Cryptography and Steganography. International Journal of Computer Applications. 9, 11 (November 2010), 3-6. DOI=10.5120/1433-1932

                        @article{ 10.5120/1433-1932,
                        author  = { Dhawal Seth,L. Ramanathan,Abhishek Pandey },
                        title   = { Article:Security Enhancement: Combining Cryptography and Steganography },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 9 },
                        number  = { 11 },
                        pages   = { 3-6 },
                        doi     = { 10.5120/1433-1932 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Dhawal Seth
                        %A L. Ramanathan
                        %A Abhishek Pandey
                        %T Article:Security Enhancement: Combining Cryptography and Steganography%T 
                        %J International Journal of Computer Applications
                        %V 9
                        %N 11
                        %P 3-6
                        %R 10.5120/1433-1932
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world of high technology, it is not safe to share confidential and important data on any network. Intruders are always in wake of it. They hack the data and use it for their benefit. These malicious people try to gain benefit, get attention, or to harm someone. In either case, message sender or receiver has to pay the price. To avoid these undesirable acts, Steganography and cryptography are used together to ensure security of the covert and secure message. One of the most efficient and secure algorithms is Data Encryption Standard (DES). Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message.

References
  • Anderson, R.J. & Petitcolas, F.A.P., “On the limits of Steganography”, IEEE Journal of selected Areas in Communications, May 1998.
  • Applied Cryptography, Second Edition - John Wiley & Sons, Bruce Schneier.
  • Communication networks: fundamental concepts and key architectures - Alberto León-García, Indra Widjaja.
  • Davies, D.W.; W.L. Price (1989). Security for computer networks, 2nd edition John Wiley & Sons.
  • Digital Steganography: Hiding Data within Data- Artz, D.; Los Alamos Nat. Lab., NM.
  • Introduction to Cryptography – Ranjan Bose – Tata Mc-Grew– hill Publisher ltd, 2001.
  • Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.
  • Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
  • Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science.
  • R. L. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM 21, 2 (Feb, 1978), 120-126.
  • Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cryptography Encryption Decryption Steganography Cipher text

Powered by PhDFocusTM