A Novel Approach of Steganography using Hill Cipher

نویسندگان

  • Sainik Kumar Mahata
  • Anupam Mondal
  • Deepak Kumar
  • Pinaki Majumdar
چکیده

In the modern technological world, where data or image transfer through the internet has gained utmost importance, security of the data has become a major issue. We use cryptography for the security of the above mentioned data. By the help of cryptography, we convert plain text into cipher text, or data that is unreadable to the attacker. Another approach is to hide data in image and then send it to the receiver. This is known as steganography. Various approaches of steganography has been discovered earlier, which includes changing of data in pixels with the data that the sender needs to send. In the discussed approach, we will also find out the pixel matrix of an image, but we will multiply the found out matrix with a cipher matrix. In this way, we will convert the original image into encrypted image and then subject it to communication. Keyword Cipher, Cipher text, Cryptography, Decryption, Encryption, Matrix, Plaintext.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

A Novel Approach for Multilevel Steganography

The proposed scheme is a multi level steganography in which steganography is done at two places. The cover image is divided into fixed size blocks and then Discrete Cosine Transformation is applied into each block of cover image. The resulting DCT coefficients are quantized using quantization process. In the quantized DCT coefficient, the encrypted data file is embedded by using Least Significa...

متن کامل

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack

Hill Cipher is a symmetric cryptosystem that was claimed to suffer from known-plaintext attack for many years. Different methods have been proposed to make this cipher more secure against known attacks. The introduced classic Hill cipher by Tourani and Falahati in 2011 that was devised in two variants and based upon affine transformation, was considered to be more secure against known attacks. ...

متن کامل

High capacity steganography tool for Arabic text using 'Kashida'

Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013