A Hybrid Approach for Data Hiding using Cryptography Schemes

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - August Issue 2013 by IJCTT Journal
Volume-4 Issue-8                           
Year of Publication : 2013
Authors :Gurtaptish Kaur, Sheenam Malhotra

MLA

Gurtaptish Kaur, Sheenam Malhotra "A Hybrid Approach for Data Hiding using Cryptography Schemes"International Journal of Computer Trends and Technology (IJCTT),V4(8):2917-2923 August Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:-  The use of internet increases for communication and for other more aspects. There are number of Cryptography scheme that used to increase security where we discuss about the confidential information transfer. As unauthorized access & data loss increases so, in this work we proposed a hybrid approach to hide secret data in other file that it can’t be lost or accessed by unauthorized user. This hybrid technique can be proposed by using advance hill cipher and DES to enhance the security which can be measured by calculating PSNR & MSE values. This technique is a new technique for hiding text data behind the image file and increase the security.

 

References-
[1] Elayaaraja and M.Sivakumar, “Securing data using 4 variables linear block cipher Asymmetric key Algorithm”, International Journal of Computers and Distributed Systems www.ijcdsonline.com Vol.1, Issue 3, October 2011.
[2] Devendra Kumar Malakar, Prof. Dineshchandra Jain, “The Problem Analysis on Encryption Techniques in Cryptography”, International Journal of Societal Applications of Computer Science, Vol.2 , Issue 5 ,May 2012.
[3] A. Bagherzandi, M. Salmasizadeh, and J. Mohajeri, “A related key attack on the feistel type block ciphers," International Journal of Network Security, Vol. 4 No 4,issue 2,2010.
[4] L. Sreenivasulu Reddy “A New Modal of Hill Cipher Using Non- quadratic Residues”, International Journal of Soft Computing and Engineering,, Vol.2, Issue-2, May 2012.
[5] V. Umakanta Sastry, N. Ravi Shankar, “A Modified Hill Cipher Involving Interweaving and Iteration”, International Journal of Network Security , Vol. 4, pp .11-16, July 2010.
[6] Mohsen Toorani, Abolfazl Falahati , “A Secure Cryptosystem based on Affine Transformation,” Journal of Security and Communication Networks, Vol. 4,Issue 2, pp. 207-215, Feb. 2011.
[7] O.Y. Chuan and M.R.K. Ariffin,” A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes”, Journal of Computer Science, Department Computer Science, Faculty of Informatics, University,Vol.7, Issue No.2,pp.785-789,2011.
[8] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrah, “ Novel Methods of Generating Self-Invertible Matrix for Hill ,Cipher Algorithm”, International Journal of Security (CSC Journals), Vol. 4, Issue 1, pp. 14-21, 2007.

Keywords Cryptography, Data hiding, Encryption, Security.