Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(63.87KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
A Novel Steganography Technique that Embeds Security along with Compression
Anuradaha, Nidhi Sharma, Rimple gilhotra
Pages - 469 - 476     |    Revised - 01-11-2011     |    Published - 15-12-2011
Volume - 5   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Compression, Arithmetic Coding, Steganography, Hexadecimal, One Time Pad
ABSTRACT
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 Bielefeld Academic Search Engine (BASE) 
5 Scribd 
6 SlideShare 
7 PdfSR 
1 Christian Cachin, “An Information-Theoretic Model for Steganography”, A preliminary version of this work was presented at the 2nd Workshop on Information Hiding, Portland, USA, 1998, and appears in the proceedings (D. Aucsmith, ed., Lecture Notes in Computer Science, vol. 1525, Springer).Original work done at MIT Laboratory for Computer Science, supported by the Swiss National Science Foundation (SNF).March 3, 2004, pp. 1-14.
2 Eric Cole, Ronald L. Krutz, James W. Conley, “Network security bible” Wiley Pub. 2005, pp. 482-520
3 SecondLieutentJ.caldwell,“Steganography”,UnitedStatesAirForce,http://www.stsc.hill.af.mil /crosstalk/2003/caldwell.pdf, June2003.
4 Guy E. Blelloch. Computer Science Department. Carnegie Mellon University blellochcs. cmu.edu.http://www.cs.cmu.edu/afs/cs/project/pscicoguyb/realworld/www/compression. pdf ,September 25, 2010.
5 V.Kavitha , K.S Easwarakumar. “Enhancing Privacy in Arithmetic Coding” ICGST-AIML Journal, Volume 8, Issue I, pp. 23-28, June 2008.
6 IAN H. WIllEN, RADFORD M. NEAL, and JOHN G. CLEARY. “Arithmetic coding for data compression.” Communications of the ACM , Volume 30 Number 6,pp.521-540, June 1987.
7 Ajit Singh, Nidhi Sharma. “Development of mechanism for enhancing the Data Security using Quantum Cryptography.” Advanced Computing: An International Journal (ACIJ), Vol.2, No.3, pp.22-25, May 2011.
8 Herodotus. The Histories. London, England: J. M. Dent & Sons Ltd, 1992.
9 Ajit Singh , Rimple Gilhotra. “Data security using private key encryption system based on arithmetic coding.” International Journal of Network Security & Its Applications (IJNSA), vol.3, no.3, May 2011.
10 Mehdi Kharrazi, Husrev T. Sencar Nasir Memon. “Performance study of common image Steganography and steganalysis techniques.” Journal of Electronic Imaging 15(4),041104 (Oct–Dec 2006)
11 M. Kharrazi, H. T. Sencar, and N. Memon, Image Steganography Concepts and Practice, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Singapore _2004
12 J.A Storer, (1988) “Data Compression: Methods and Theory” Computer Science Press.
13 Glen G. Langdon, (1984) “An introduction to arithmetic coding”, IBM Journal of Research and Development Volume 28, No.2
Miss Anuradaha
DCRUST,Murthal - India
anu107sharma@gmail.com
Miss Nidhi Sharma
Banasthali Vidyapeeth Bansthali - India
Miss Rimple gilhotra
Banasthali Vidyapeeth Bansthali - India