20-04-2012, 04:51 PM
VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES
SHAHEEN.PDF (Size: 144.51 KB / Downloads: 72)
BASIC OVERVIEW ON CRYPTOGRAPHY
A large number of cryptography algorithms have been
created till date with the primary objective of converting
information into unreadable ciphers (an encrypted piece of
text). We will discuss the two basic and most commonly used
algorithms – The joint key cryptography and the public key
cryptography.
THE JOINT KEY CRYPTOGRAPHY (Symmetric key cipher)
uses a common key for encryption and decryption of the
message. This key is shared privately by the sender and the
receiver. The sender encrypts the data using the joint key and
then sends it to the receiver who decrypts the data using the
same key to retrieve the original message. Joint key cipher
algorithms are less complex and execute faster as compared
to other forms of cryptography but have an additional need to
securely share the key. In this type of cryptography the
security of data is equal to the security of the key. In other
words it serves the purpose of hiding a smaller key instead of
the huge chunk of message data.
BASIC OVERVIEW ON STEGANOGRAPHY
Steganography is the art of hiding the existence of the
communication message before sending it to the receiver. It
has been practiced since 440 B.C. in many ways like writing
information on the back of cattle in a herd, invisible ink etc.
Some relatively modern ways include hiding the information
in newspaper articles and magazines etc.
MULTIMEDIA IMAGE FILES
Multimedia content basically comprises of images, videos
and audio files. Images form the basis of visual multimedia.
Videos are streams of images displayed in sequence at a
certain speed. We shall focus on image files to achieve visual
steganography.
PROPOSED METHOD
Cryptographic algorithms generally need a reference table
which aids the conversion of a small block of data into
another block (may not be a block of data in the original
content).
• In order to provide higher security levels the
algorithm is designed to use a reference database as
shown in Fig. 2. The reference database will consist
of various reference grids. Each of these grids will
have a 3-d representation of the encoding schema
which will be used to represent the characters in
terms of specific numbers.
APPLICATION AREAS AND FUTURE SCOPE
This method can be used to increase the security on web
based applications. The user will be asked to provide the
secret key and the password can be compared from image
files using the key. It can be used as advancement over the
existing option to input the security phrase in various web
based applications.
SHAHEEN.PDF (Size: 144.51 KB / Downloads: 72)
BASIC OVERVIEW ON CRYPTOGRAPHY
A large number of cryptography algorithms have been
created till date with the primary objective of converting
information into unreadable ciphers (an encrypted piece of
text). We will discuss the two basic and most commonly used
algorithms – The joint key cryptography and the public key
cryptography.
THE JOINT KEY CRYPTOGRAPHY (Symmetric key cipher)
uses a common key for encryption and decryption of the
message. This key is shared privately by the sender and the
receiver. The sender encrypts the data using the joint key and
then sends it to the receiver who decrypts the data using the
same key to retrieve the original message. Joint key cipher
algorithms are less complex and execute faster as compared
to other forms of cryptography but have an additional need to
securely share the key. In this type of cryptography the
security of data is equal to the security of the key. In other
words it serves the purpose of hiding a smaller key instead of
the huge chunk of message data.
BASIC OVERVIEW ON STEGANOGRAPHY
Steganography is the art of hiding the existence of the
communication message before sending it to the receiver. It
has been practiced since 440 B.C. in many ways like writing
information on the back of cattle in a herd, invisible ink etc.
Some relatively modern ways include hiding the information
in newspaper articles and magazines etc.
MULTIMEDIA IMAGE FILES
Multimedia content basically comprises of images, videos
and audio files. Images form the basis of visual multimedia.
Videos are streams of images displayed in sequence at a
certain speed. We shall focus on image files to achieve visual
steganography.
PROPOSED METHOD
Cryptographic algorithms generally need a reference table
which aids the conversion of a small block of data into
another block (may not be a block of data in the original
content).
• In order to provide higher security levels the
algorithm is designed to use a reference database as
shown in Fig. 2. The reference database will consist
of various reference grids. Each of these grids will
have a 3-d representation of the encoding schema
which will be used to represent the characters in
terms of specific numbers.
APPLICATION AREAS AND FUTURE SCOPE
This method can be used to increase the security on web
based applications. The user will be asked to provide the
secret key and the password can be compared from image
files using the key. It can be used as advancement over the
existing option to input the security phrase in various web
based applications.