Abstract

Conventional techniques for security of data, designed by using only one of the security mechanisms, cryptography or steganography, are suitable for limited applications only. In this paper, we propose a crypto-stego system that would be appropriate for secure transmission of different forms of data. In the proposed crypto-stego system, we present a mechanism to provide secure transmission of data by multiple safety measures, firstly by applying encryption using Affine Transform and Discrete Cosine Transform (DCT) and then merging this encrypted data with an image, randomly chosen from a set of available images, and sending the image so obtained to the receiver at the other end through the network. The data to be sent over a communication channel may be a gray-scale or colored image, or a text document (doc, .txt, or .pdf file). As it is encrypted and sent hidden in an image, it avoids any attention to itself by the observers in the network. At the receiver’s side, reverse transformations are applied to obtain the original information. The experimental results, security analysis and statistical analysis for gray-scale images, RGB images, text documents (.doc, .txt, .pdf files), show robustness and appropriateness of the proposed crypto-stego system for secure transmission of the data through unsecured network. The security analysis and key space analysis demonstrate that the proposed technique is immune from cryptanalysis.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.