IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 6, June 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

[Full Text]

 

AUTHOR(S)

Mita Kosode, Suresh Gawande

 

KEYWORDS

Index Terms: Galois field, interception, stegnography.

 

ABSTRACT

Abstract: In this paper we are using the existing passcode based approach of hiding classified information in images with addition of the Galois field theory,which is advancing the security level to make this combination method extremely difficult to intercept and useful for open channel communication while maintaining the losses and high speed transmission.

 

REFERENCES

[1] P. Marwaha and P. Marwaha, “Visual cryptographic steganography in images”, Proc. Int. Conf. on Computing Communication and Networking Technologies, Karur, India, July 29-31, 2010, pp. 1-6.

[2] D. Kahn, Information Hiding: First International Workshop, R.J. Anderson, Editor, Cambridge, UK: Springer-Verlag, 1996, vol. 1174, Lecture Notes in Computer Science, pp. 1-5.

[3] A. Almohammad and G. Ghinea, “Image steganography and chrominance components”, Proc. IEEE Int. Conf.on Computer andInformation Technology, Bradford, UK, June 29 2010-July 1 2010, pp. 996-1001.

[4] E. T.Lin and E. J. Delp, “A review of data hiding in digital images”, CERIAS Tech. Report, no.149, 2001.

[5] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color and gray-scale images”, IEEE Multimedia Special Issue on Security, vol.8, no.4, pp.22-28, Oct-Dec 2001.

[6] H. Mathkour, G.M.R. Assassa, A. Al Muharib, and I. Kiady, “A novel approach for hiding messages in images”, Proc. Int. Conf. on Signal Acquisition and Processing, Kuala Lumpur, Malaysia, April 3-5, 2009, pp. 89-93.

[7] S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis”, IEEE Trans. on Signal Processing, vol.51, no.7, pp.1995-2007, 2003.

[8] X. Luo, B. Liu, and F. Liu, “Detecting LSB steganography based on dynamic masks”, Proc. of the Int. Conf. on Intelligent Systems Design and Applications, Wroclaw, Poland, Sept. 8-10, 2005, pp.251- 255.

[9] T. Zhang, Y. Zhang, X. Ping, and M. Song, “Detection of LSB steganography based on image smoothness”, Proc. IEEE Int.Conf. on Multimedia and Expo., Toronto, Canada, July 9-12 2006, pp.1377- 1380.

[10] S. Sarreshtedari, M.Ghotbi, and S.Ghaemmaghami, “One-third probability embedding: Less detectable LSB steganography”, Proc. IEEE Int.Conf.on Multimedia and Expo.,New York, NY, June 28 2009-July 3 2009, pp.1002-1005.

[11] D. Artz, “Digital steganography: Hiding data within data”, IEEE Internet Computing, vol.5, no.3, pp. 75-80, May-June 2001.

[12] [Vijay Devabhaktuni, Vishwanath Ullagaddi, Brent D. Cameron, Firas Hassan, and Douglas Nims “A New Passcode Based Approach for HidingClassified Information in Images” 45th Southeastern Symposium on System Theory Baylor University, Waco, TX, USA, March 11, 2013

[13] Dr.Ravi Shankar Mishra, Puran Gour and Mohd Abdullah “Design & Implementation of 4 Bit Galois Encoder and Decoder on FPGA” International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 7 July 2011.