MULTIPLE-LAYERED SECURITIES USING STEGANOGRAPHY AND CRYPTOGRAPHY

Abubaker Wahaballa, Osman Wahballa, Fagen Li, Mohammed Ramadan and Zhiguang Qin

References

  1. [1] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen (IEEE Computer Society, 1998), ISSN: 0018-91628.
  2. [2] R.S. Rajan and S. Tamilenthi, An overview of new trendsin cryptography, Recent Research in Science and Technology,4(6), 2012, 38–42.
  3. [3] D. Bloisi and L. Iocchi, Image based steganography andcryptography, Proc. International Conf. on Computer VisionTheory and Applications (VISAPP), Barcelona, Spain, 2007,8–11.
  4. [4] http://dictionary.com
  5. [5] B. Dunbar, A detailed look at steganographic techniques and their use in an open-systems environment (Information Security Reading Room, Washington, DC: Sans Institute, 2002).
  6. [6] T. Morkel, H.E. Jan, and S.O. Martin , An overview of image steganography, Proc. Fifth Annual Information Security South Africa Conf. (ISSA 2005), Sandton, South Africa, 2005.
  7. [7] S. Goyal, A survey on the applications of cryptography, International Journal of Engineering and Technology, 2(3), 2012, 352–355.
  8. [8] A.J. Menezes, P.C. Van-Oorschot, and S.A. Vanstone, Hand-book of applied cryptography (Boca Raton, FL: CRC Press, 2010).
  9. [9] R.A. Joseph and V. Sundaram, Cryptography and steganog-raphy – A survey, International Journal, 2(3), 2010, 626–630.
  10. [10] W. Stallings, Cryptography and network security principle and practice, 5th ed. (Beijing: Publishing House of Electronic Industry, 2011).
  11. [11] D.K. Sarmah and B. Neha, Proposed system for data hiding using cryptography and steganography, International Journal of Computer Applications, 8(9), 2010, 7–10.
  12. [12] K. Challita and F. Hikmat, Combining steganography andcryptography: New directions, International Journal of NewComputer Architectures and their Applications, 1(1), 2011,199–208.
  13. [13] K. Bailey and K. Curran, An evaluation of image basedsteganography methods, Multimedia Tools and Applications,30(1), 2006, 55–88.
  14. [14] P.H.-W. Wong, O.C. Au, and Y.M. Yeung, Novel blind multiple watermarking technique for images, IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 2003, 813–830.
  15. [15] K. Jithesh and D.A.S. Kumar, Multilayer information hiding – A blend of steganography and visual cryptography, Journal of Theoretical and Applied Information Technology, 19(1/2), 2005, 109–116.
  16. [16] X.H. Dang and C.S. Kota, Case study: An implementation of a secure steganographic system, Proc. International Conf. on Security and Management (SAM 2006), Las Vegas, NV, 2006.
  17. [17] S.P. Kumar, K. Anusha, and R.V. Ramana, A novel approach to enhance robustness in steganography using multiple watermark embedding algorithm, International Journal of Soft Computing and Engineering (IJSCE), 2001, ISSN: 2231-2307 (online).
  18. [18] E. Madhavarao, C.J. Raju, P. Divya, and A.S.K. Ratnam, Data security using cryptography and stegnography, International Journal of Advanced Research in Computer Engineering and Technology, 1(5), 2012, 319–325.
  19. [19] J. Vivek, K. Lokesh, M.S. Madhur, S. Mohd, and R. Kshitiz, Public-key steganography based on modified LSB method, Journal of Global Research in Computer Science, 3(4), 2012, 26–29.
  20. [20] A. Bahrami, Object oriented system development (Singapore: The McGraw-Hill Companies, 1999).
  21. [21] R. Hosseinkhani and H.H.S. Javadi, Using cipher key to generate dynamic S-box in AES cipher system, International Journal of Computer Science and Security, 6(1), 2012, 19–28.
  22. [22] Q. Huynh-Thu and M. Ghanbari, Scope of validity of PSNR in image/video quality assessment, Electronics Letters, 44(13), 2008, 800–801.

Important Links:

Go Back