##plugins.themes.academic_pro.article.main##

Abstract

Abstract: Securing the information from other  persons is always difficult one when we are connected in an open network. In order to send some confidential information we must protect it from the attackers. Cryptography and Steganography plays vital role in securing information from others. Cryptography is the art of secret writing and Steganography is the art of hiding information. When combining these two mechanisms leads to an high security Hence the proposed method will encrypt the data with crypto technique using Blowfish algorithm and then embed the encrypted data into the cover image with stego technique using Edge based Adaptive Pixel Pair Matching (EAPPM) method. With the proposed method in this paper a double layered security for the confidentiality of the information hidden in the stego file is ensured. i.e., even though the attackers able to retrieve the hidden information from the stego file they will get only the encrypted message, which needs more time to crack the encryption scheme. The experimental results show the proposed method is hiding the information in fair manner compared against normal Adaptive Pixel Pair Matching (APPM) method.

Keywords: Adaptive Pixel Pair Matching (APPM), Blowfish, Edge based Adaptive Pixel Pair Matching (EAPPM).

##plugins.themes.academic_pro.article.details##

Author Biography

Mr. K.PRADEEP KRISHNAN, Ms.R.ARUNYA, M.Tech

 DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

SATHYABAMA UNIVERSITY, JEPPIAR NAGAR CHENNAI-600 119.TAMIL NADU

How to Cite
Ms.R.ARUNYA, M. K. K. (2014). Securing Cipher Information using Edge based Adaptive Pixel Pair Matching. International Journal of Emerging Trends in Science and Technology, 1(03). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/37

References

REFERENCES
[1] Anastasia Ioannidou, Spyros T. Halkidis, George Stephanides “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications 39 (2012) 11517–11524.
[2] Cheng-HsingYang “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Journal of Pattern Recognition 41 (2008) 2674 – 2683.
[3] Chi-Kwong Chan, L.M. Cheng “Hiding data in images by simple LSB substitution” Journal of Pattern Recognition 37 (2004) 469 – 474.
[4] Eric Cole.”Hiding in Plain Sight: Steganography and the Art of Covert Communication”.
[5] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker.”Digital Watermarking and Steganography”, Second Edition 2008.
[6]Jarno Mielikainen “LSB Matching Revisited” IEEE signal processing letters, vol. 13, no. 5, may 2006.
[7]Jianjun Wang ,YitingSun et.al. “An improved section-wise exploiting modification direction method”, Journal of Signal Processing 90 (2010) 2954–2964.
[8]National Bureau of Standards – 3-Data Encryption Standard, FIPS Publication 46, 1977. [9]National Bureau of Standards – Data Encryption Standard, FIPS Publication 46, 1977. [10] NIST, "Advanced Encryption Standard Call", NIST, 1997. http://www.nist.gov/aes/
[11] Verma O P, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi “Peformance Analysis of Data Encryption Algorithms” Electronics Computer Technology (ICECT), 2011 3rd International Conference.
[12] Ruey-Ming Chao, Hsien-ChuWu, Chih-Chiang Lee, and Yen-Ping Chu “A Novel Image Data Hiding Scheme with Diamond Encoding” ” EURASIP Journal on Information Security Volume 2009.
[13] Schneier B. “Description of a New Variable-length Key 64- Bit Block Cipher


(Blowfish).” Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-
Verlag, 1994, pp. 191-204. http://www.schneier.com/paper-blowfishfse.html
[14] Shanmugam.E and Dr.T.K.Thivakaran, “Performance Comparison of AES and Blowfish for Dual Layer Security in an Open Channel”. 3rd Indian Conference on Computational Intelligence (ICCI), April 2013.
[15] Stallings, Cryptography & Network Security - Principles & Practice, Prentice Hall, 3rd Edition
2002.
[16] Stefan Katzenbeisser and Fabien A “Information Hiding Techniques for Steganography and Digital Watermarking”.
[17] Wien Hong and Tung-Shou Chen “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching”, IEEE transactions on information forensics and security, vol. 7, no. 1, february 2012