Multi-Layered Security System Using Cryptography and Steganography

Authors

  • Mahima N Department of Cloud Technology and Information Security, School of Engineering and Technology, Jain University, Bengaluru, India, Author
  • Noor Siddiqa Department of Cloud Technology and Information Security, School of Engineering and Technology, Jain University, Bengaluru, India, Author
  • Tanvir Habib Sardar Assistant Professor, School of Engineering and Technology, Jain University, Bengaluru, India Author

Keywords:

Information Security, Cryptography, Steganography

Abstract

The Internet as a whole does not use secure  links, thus information being transmitted may be  vulnerable to interception as well. The importance of  reducing the chances of information being detected  during transmission is a major issue. A solution to be  discussed is how passing of information can be done in a  manner that the very existence of the message is  unknown. This is important in order to repel attention  from the potential attacker. Besides hiding data for  confidentiality, this approach of information hiding can  be extended to copyright protection of digital media. In  this work, we focus on the achievement of a  multi-layered security system by combining both  cryptography and steganography. Encryption avoids  passive attacks (reading) and by steganography, the  message becomes undetectable. We make use of AES  algorithm and Least Significant Bit (LSB) technique for  hiding messages in an image. We have enhanced the  LSB technique by randomly dispersing the bits of the  message in the image and thus making it harder for an  unauthorized person to extract the original message.  The AES provides a good security as it takes  considerably much more time to break by the brute  force method for a given key length. The proposed  methodology is proved good and produced expected  output. 

Downloads

Download data is not yet available.

References

An Overview Of Crptography-9 November 2010,By Gary C Kessler

http://www.garykessler.net/library/crypto.html#intro

Improving Embedding Efficiency Of Covering Codes For Applications In Steganography By WeimingZhang,ShuozhongWang,AndXinpeng Zhan

A detailed look at Steganographic Techniques and their use in an Open Systems Environment- By Bret Dunba.

.Implementation and Analysis of AES, DES and Triple DES on GSM Network, MajithiaSachin Lecturer, Department of Information Technology, Chandigarh Engineering College Landran (Mohali, PB), India, 2010

.AES Advanced Encryption Standard CSC 7002 Computer Security by William Roche, University of Colorado, Denver, May 2006

NavitaAgarwal, Himanshu Sharma “An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography”, IJCSMC, vol. 2 issue 5, pp. 376-385, May 2013.

Gary C.Kessler, “An Overview of Cryptography: Cryptographic”, HLAN, ver. 1, 1999-2014

Downloads

Published

2019-01-01

How to Cite

Multi-Layered Security System Using Cryptography and Steganography . (2019). International Journal of Innovative Research in Computer Science & Technology, 7(2), 8–11. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13367