A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication

نویسندگان

  • Gaurav Prasad
  • Sujay Narayana
چکیده

This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Design of a novel congestion-aware communication mechanism for wireless NoC architecture in multicore systems

Hybrid Wireless Network-on-Chip (WNoC) architecture is emerged as a scalable communication structure to mitigate the deficits of traditional NOC architecture for the future Multi-core systems. The hybrid WNoC architecture provides energy efficient, high data rate and flexible communications for NoC architectures. In these architectures, each wireless router is shared by a set of processing core...

متن کامل

An Efficient Concealed Data Aggregation Scheme for Wireless Sensor Networks

Soon after wireless sensor networks (WSNs) have attracted much attention both in industry and academia, maintaining the security of WSNs, especially end-to-end confidentiality, becomes a challenging problem. A sensor device has the limited computation capability, battery power, less memory size, and unreliable communication protocols. In order to save the overall energy resources and maintain t...

متن کامل

A Novel Hybrid Droop-Isochronous Control Strategy for Microgrid Management

The droop control strategy is the most common approach for microgrids control but its application is limited due to frequency deviation following a load change. Complementary control strategy has then been proposed to solve the problem using a communication network. However, under this strategy, regular loads profile produces a continuous change of output power of all distributed generators (DG...

متن کامل

Secured Image Transmission Using a Novel Neural Network Approach and Secret Image Sharing Technique

In this paper we have combined both cryptography and steganography techniques. This provides the higher level of secure system in which the secret information can be transferred over any unsecured communication channel and to overcome the threat of intrusion. The presented work aims at secure image transmission where a random encryption algorithm is used to encrypt different shares of stego ima...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011