##plugins.themes.academic_pro.article.main##
Abstract
Abstract: Securing the information from other persons is always difficult one when we are connected in an open network. In order to send some confidential information we must protect it from the attackers. Cryptography and Steganography plays vital role in securing information from others. Cryptography is the art of secret writing and Steganography is the art of hiding information. When combining these two mechanisms leads to an high security Hence the proposed method will encrypt the data with crypto technique using Blowfish algorithm and then embed the encrypted data into the cover image with stego technique using Edge based Adaptive Pixel Pair Matching (EAPPM) method. With the proposed method in this paper a double layered security for the confidentiality of the information hidden in the stego file is ensured. i.e., even though the attackers able to retrieve the hidden information from the stego file they will get only the encrypted message, which needs more time to crack the encryption scheme. The experimental results show the proposed method is hiding the information in fair manner compared against normal Adaptive Pixel Pair Matching (APPM) method.
Keywords: Adaptive Pixel Pair Matching (APPM), Blowfish, Edge based Adaptive Pixel Pair Matching (EAPPM).
##plugins.themes.academic_pro.article.details##
References
[1] Anastasia Ioannidou, Spyros T. Halkidis, George Stephanides “A novel technique for image steganography based on a high payload method and edge detectionâ€, Expert Systems with Applications 39 (2012) 11517–11524.
[2] Cheng-HsingYang “Inverted pattern approach to improve image quality of information hiding by LSB substitutionâ€, Journal of Pattern Recognition 41 (2008) 2674 – 2683.
[3] Chi-Kwong Chan, L.M. Cheng “Hiding data in images by simple LSB substitution†Journal of Pattern Recognition 37 (2004) 469 – 474.
[4] Eric Cole.â€Hiding in Plain Sight: Steganography and the Art of Covert Communicationâ€.
[5] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker.â€Digital Watermarking and Steganographyâ€, Second Edition 2008.
[6]Jarno Mielikainen “LSB Matching Revisited†IEEE signal processing letters, vol. 13, no. 5, may 2006.
[7]Jianjun Wang ,YitingSun et.al. “An improved section-wise exploiting modification direction methodâ€, Journal of Signal Processing 90 (2010) 2954–2964.
[8]National Bureau of Standards – 3-Data Encryption Standard, FIPS Publication 46, 1977. [9]National Bureau of Standards – Data Encryption Standard, FIPS Publication 46, 1977. [10] NIST, "Advanced Encryption Standard Call", NIST, 1997. http://www.nist.gov/aes/
[11] Verma O P, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi “Peformance Analysis of Data Encryption Algorithms†Electronics Computer Technology (ICECT), 2011 3rd International Conference.
[12] Ruey-Ming Chao, Hsien-ChuWu, Chih-Chiang Lee, and Yen-Ping Chu “A Novel Image Data Hiding Scheme with Diamond Encoding††EURASIP Journal on Information Security Volume 2009.
[13] Schneier B. “Description of a New Variable-length Key 64- Bit Block Cipher
(Blowfish).†Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-
Verlag, 1994, pp. 191-204. http://www.schneier.com/paper-blowfishfse.html
[14] Shanmugam.E and Dr.T.K.Thivakaran, “Performance Comparison of AES and Blowfish for Dual Layer Security in an Open Channelâ€. 3rd Indian Conference on Computational Intelligence (ICCI), April 2013.
[15] Stallings, Cryptography & Network Security - Principles & Practice, Prentice Hall, 3rd Edition
2002.
[16] Stefan Katzenbeisser and Fabien A “Information Hiding Techniques for Steganography and Digital Watermarkingâ€.
[17] Wien Hong and Tung-Shou Chen “A Novel Data Embedding Method Using Adaptive Pixel Pair Matchingâ€, IEEE transactions on information forensics and security, vol. 7, no. 1, february 2012