TY - GEN
T1 - Information hiding through dynamic text steganography and cryptography
T2 - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
AU - Bhat, Deepali
AU - Krithi, V.
AU - Manjunath, K. N.
AU - Prabhu, Srikanth
AU - Renuka, A.
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/11/30
Y1 - 2017/11/30
N2 - Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.
AB - Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged. This paper explores an efficient method of secure data transmission through information hiding which includes text steganography and cryptography. The proposed methodology was built on top of the result of the Data Encryption Standard (DES), a symmetric key algorithm used for cryptography. The concept of data hiding is realized using text steganography i.e. a secret message is concealed within another text. The text used to hide the sensitive information was constructed dynamically and did not reveal the presence of any secret data. It can be concluded that the combination of these two cryptographic techniques provides an efficient solution for information hiding and data transmission through unsecured channels.
UR - http://www.scopus.com/inward/record.url?scp=85042659664&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85042659664&partnerID=8YFLogxK
U2 - 10.1109/ICACCI.2017.8126110
DO - 10.1109/ICACCI.2017.8126110
M3 - Conference contribution
AN - SCOPUS:85042659664
VL - 2017-January
T3 - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
SP - 1826
EP - 1831
BT - 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 13 September 2017 through 16 September 2017
ER -