Professional Documents
Culture Documents
A Survey on
n Enhancement of Text Security Using
U
Steganography aand Cryptographic Techniques
Priya Jain1, Somesh Kumar2, Raj Kumar Goel2
1
M. Tech Student, 2Assistant Professor
Department of Computer Science Engineering,
Noida Institute of Engineering & Technology, Greater Noida, Uttar Pradesh, India
ABSTRACT
Increase in the number of attack recorded during watermarking, cryptography and steganography. In
electronic exchange of information between the watermarking,
ermarking, data are hidden to convey some
source and intended destination has indeed called for information about the cover medium such as
a more robust method for securing data transfer. ownership and copyright. Cryptography techniques
Cryptography and steganography are well known and are based on rendering the content of a message
widely used techniques that manipulate information in garbled to unauthorized people. Steganography
order to cipher or hide their existence. Many different techniques are based on hidinghidi the existence of
carrier file format scan be used but digital images are information by embedding the secret message in
the most popular because of their eir frequency on the another cover medium. While all three are
internet. The digital images are the most popular information security techniques cryptography and
because of their frequency on the Web among all steganography are having wide application as
different carrier file formats. Image steganography, watermarking is limited to having information
achieves the secrecy by embedding data into cover particularly
larly about the cover medium. With the growth
image and generating a stego-image.. There are many of computer network, security of data has become a
types of steganography techniques each have their major concern and thus data hiding technique has
advantages and disadvantages. This paper discussed a attracted people around the globe. Steganography
technique used on the advanced LSB (least significant techniques are used to address digital copyrights
bit) and RSA algorithm. By matching data to an management, protect information, and conceal secrets.
image, there is less chance of an attacker
ttacker being able to Cryptography involves converting a message text into
use steganalysis to recover data. Before hiding the an unreadable cipher. A large number of cryptography
data in an image the application first encrypts it. algorithms have been created till date with the
primary objective of converting information into
Keywords: Stegnography, Cryptography, LSB unreadable ciphers Cryptography systems can be
broadly classified into symmetric-key
symmetric systems and
I. INTRODUCTION public key systems. The symmetric key system uses a
The growing use of Internet among public masses and common key for encryption and decryption of the
availability of public and private digital data and its message. This key is shared privately by the sender
sharing has driven industry professionals and and the receiver. The sender encrypts the data using
researchers to pay a particular attention to information the joint key and then sends it to the receiver who
security. Internet users frequently need to sstore, send, decrypts the data using the same key to retrieve the
or receive private information and this private original message. The public-- key systems that use a
information needs to be protected against different key for encryption as one used for
unauthorized access and attacks. Presently, three main decryption. Publicc key systems require each user to
methods of information security being used: have two keys – a public key and a private key (secret
Alice Bob
Computes
Compute R = rG
KB = h.dB.R = (Kx, Ky )
Compute Compute
K = hrQB = (Kx, Ky) k1||k2 = KDF(Kx)
Sends (R, c, t)
Compute
Verify that t = MACk2(c)
k1||k2 = KDF(Kx)
Computes m = ENCk1–1(c)
Compute
c = ENCk1(m)
m is the
decrypted Plain
Compute
Text message
t = MACk2(c)