An Adaptive Pseudorandom Stego-crypto Technique for Data Communication

نویسندگان

  • Ajay Kumar Nain
  • Shailender Gupta
  • Bharat Bhushan
  • Rashmi Chawla
چکیده

To provide security in data communication networks various forms of cryptographic and steganographic algorithms have been proposed. Though both of these techniques serve the same purpose i.e. to secure data but have some drawbacks. Using cryptography might raise some suspicion whereas in steganography the distortion in cover can attract an adversary. The combinations of the two as proposed by various researchers can be very fruitful in terms of brute force search time and robustness against attacks. A popular method of combination is using pseudorandom Least Significant Bit (LSB) substitution along with stream cipher or block cipher. The problem with pseudorandom LSB substitution technique is with the random pixel selection process. It inserts the cipher text on randomly chosen pixels using random interval method having certain period. Now if this period of random interval number generations is large, it increases time complexity. On the other hand if it is too low then the cipher text will not be evenly distributed in all the colour planes. This paper proposes an adaptive method on the basis of size of secret data for random pixel selection for data embedding. The results show that using such an approach not only increases brute force search time but also reduces the time complexity of the overall process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator

We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not require expensive zero-knowledge proofs and its communication complexity does not depend on the computational complexity of the underlying cryptographic primitive. Our protocol withstands an active, adaptive adversary corrup...

متن کامل

International Journal of Electronics Communication and Computer Technology

Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution ...

متن کامل

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

Sub Pipelined Architecture for Self-Test Techniques of Crypto Devices Based on AES With High Throughput

Testing of the equipment is very essential before being put into service. The testing has to be done by the latest technique. This paper describes a generic built-in self-test strategy for crypto devices with sub pipelining architecture by implementing symmetric encryption algorithms. Taking advantage of the inner iterative structures of crypto-cores, test facilities are easily set-up for self-...

متن کامل

Data Hiding in Digital Images using Cryptography and Steganography Techniques (CryptSteg)

The two common different techniques for securing data transmission are cryptography and steganography. Steganography is not intended to replace cryptography but rather to supplement it. If a message is encrypted and hidden with a steganographic method it provides an additional layer of protection and reduces the chance of the hidden message being detected. In this paper, two layers of security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013