Advance Cryptography Scheme for Data Hiding using Advance Hill cipher & DES
| International Journal of Computer Trends and Technology (IJCTT) | |
© - July Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-7 | ||
Year of Publication : 2013 | ||
Authors :Gurtaptish Kaur, Sheenam Malhotra |
Gurtaptish Kaur, Sheenam Malhotra "Advance Cryptography Scheme for Data Hiding using Advance Hill cipher & DES"International Journal of Computer Trends and Technology (IJCTT),V4(7):2383-2387 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- Cryptography is a scheme that used to increase security in most of the fields. Security is mandatory where we discuss about the confidential information. As with know, the use of internet rises, most of organizations transfer their confidential information through internet which is not fully secure and there is a chance of data loss or unauthorized access. In this work, we proposed an advance technique to hide secret text data in image file that it can’t be lost or accessed by malicious user. In this proposed technique, we use advance hill cipher and DES to enhance the security level which can be measured by some measuring factors. The result of this work shows that this advance hybrid scheme gives better results than previous techniques.
References-
[1] P. Elayaraja and M. Sivakumar , “New Approach and Additional Security to Existing Cryptography Using Cubical Combinatorics”.
[2] Neetu Settia ,“Cryptanalysis of Modern Cryptographic Algorithms” Vol. 1, Issue 2, December, 2010
[3] Anders Larsson, “Cryptography”, A personal project in the course TDDD55 By Anders 760903-7192.
[4] Yousuf Ibrahim Khan, Saad Mahmud Sonyy, S.M. Musfequr Rahman ,“Image based Cryptography from a distance”
[5] Ramchandra S. Mangrulkar1, Pallavi V. Chavan2,"Encrypting Informative Image by Key Image using Hill Cipher Technique" International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May, 2009.
[6] Ruisong Ye,Wei Zhou, “An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice” ,International Journal of Information and Communication Technology Research, Department of Mathematics, Shantou University Shantou, Guangdong,China ,Volume 1, No. 8, December, 2011.
[7] Xiaoyi Zhou*1,2, Jixin Ma2, , Yongzhe Zhao, Ergodic Matrix and Hybrid-key Based Image Cryptosystem” Computer Science and Technology School, Jilin University, Changchun, Jilin, China, June, 2011.
[8] Mao, Y. B., Chen, G., Lian, S. G.,” A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos ,14, 613--3624 ,2004.
[9] Y. Rangel-Romero, G. Vega-García, A. Menchaca-Méndez, D. Acoltzi-Cervantes, L. Martínez-Ramos, M. Mecate-Zambrano, F. Montalvo-Lezama, J. Barrón-Vidales, N. Cortez-Duarte and F. Rodríguez-Henríquez, “Comments on How to repair the Hill cipher”, Journal of Zhejiang University Science A, vol. 9, no. 2, (2006), pp. 211-214.
[10] A. H. Rushdi and F. Mousa, “Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher”, Int’l Journal of Computer Science and Network Security, vol. 9, no. 5, (2009), pp. 11-16.
Keywords : — Security, Data hiding, Cryptography, Hill-cipher++, DES.