Book Details

CRIME INFORMATION TRANSMISSION USING STEGANOGRAPHY

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

Steganography is the method of hiding information of any type, using some type of cover medium. The type of information can be text, audio or video. Image steganography is the process when the cover medium used is an image. The proposed algorithm is a modulation of the standard Least Significant Bit Algorithm (LSB). In the proposed algorithm the information to be hidden is considered to be text. This text is taken and first encrypted using the Data Encryption Standard Algorithm (DES) with the help of a key. This key to encrypt the data is then encrypted using the RSA algorithm. This encrypted text is then hidden in an image using the standard LSB algorithm and then the image is sent. To decrypt the data, first the key has to be decrypted using RSA algorithm. Next, using that key the rest of the data is extracted out by decryption using DES algorithm. This provides a dual layer of security, by first encrypting the text using DES and then encrypting the key for DES using RSA. This ensures high reliability of the algorithm. The Steganography is based on Morphology associative memory. Often, steganalysis methods are created to detect steganography algorithms using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this paper, cover images are mapped to morphological representation by using morphology transform containing morphological coefficients, and each bit of secret message is inserted in the least significant bit of morphological coefficients.

References

  1. Alistair Mc Monnies, “Object-oriented programming in Visual C#. NET”, Pearson Education, and ISBN: 81-297-0649-0, First Indian Reprint 2004.
  2. Jittery R.Shapiro, “The Complete Reference Visual C# .NET” Edition 2002, Tata McGraw-Hill, Publishing Company Limited, New Delhi.
  3. Robert D.Schneider, Jetty R.Garbus, “Optimizing SQL Server”, Second Edition,             Pearson Education Asia, ISBN: 981-4035-20-3
  4. Svetlin Nakov,” Fndamentals of computer programming”, First Edition, Bulgaria, Faber publishing (2013).
  5. John Sharp,” Microsoft Visual C# 2013 Step by Step (Step by Step Developer)”, First Edition (November 25,2013).
  6. Paul Kimmel, “C# 5.0 in a Nutshell: The Definitive Reference Kindle Edition”, Fifth Edition (June 19,2013), O’Reilly media.

Keywords

Steganography, RSA Algorithm, Discrete Cosine Transform.

Image
  • Format Volume 10, Issue 1, No 6, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Liban Abdi Osman, Mr. N. Ganapathi Ram
  • Reference IJCS-414
  • Page No 2803-2806

Copyright 2024 SK Research Group of Companies. All Rights Reserved.