Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Novel Steganography Technique that Embeds Security along with Compression
Anuradaha, Nidhi Sharma, Rimple gilhotra
Pages - 469 - 476     |    Revised - 01-11-2011     |    Published - 15-12-2011
Volume - 5   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Compression, Arithmetic Coding, Steganography, Hexadecimal, One Time Pad
ABSTRACT
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 Bielefeld Academic Search Engine (BASE) 
5 Scribd 
6 SlideShare 
7 PdfSR 
Ajit Singh , Rimple Gilhotra. “Data security using private key encryption system based on arithmetic coding.” International Journal of Network Security & Its Applications (IJNSA), vol.3, no.3, May 2011.
Ajit Singh, Nidhi Sharma. “Development of mechanism for enhancing the Data Security using Quantum Cryptography.” Advanced Computing: An International Journal (ACIJ), Vol.2, No.3, pp.22-25, May 2011.
Christian Cachin, “An Information-Theoretic Model for Steganography”, A preliminary version of this work was presented at the 2nd Workshop on Information Hiding, Portland, USA, 1998, and appears in the proceedings (D. Aucsmith, ed., Lecture Notes in Computer Science, vol. 1525, Springer).Original work done at MIT Laboratory for Computer Science, supported by the Swiss National Science Foundation (SNF).March 3, 2004, pp. 1-14.
Eric Cole, Ronald L. Krutz, James W. Conley, “Network security bible” Wiley Pub. 2005, pp. 482-520
Glen G. Langdon, (1984) “An introduction to arithmetic coding”, IBM Journal of Research and Development Volume 28, No.2
Guy E. Blelloch. Computer Science Department. Carnegie Mellon University blellochcs. cmu.edu.http://www.cs.cmu.edu/afs/cs/project/pscicoguyb/realworld/www/compression. pdf ,September 25, 2010.
Herodotus. The Histories. London, England: J. M. Dent & Sons Ltd, 1992.
IAN H. WIllEN, RADFORD M. NEAL, and JOHN G. CLEARY. “Arithmetic coding for data compression.” Communications of the ACM , Volume 30 Number 6,pp.521-540, June 1987.
J.A Storer, (1988) “Data Compression: Methods and Theory” Computer Science Press.
M. Kharrazi, H. T. Sencar, and N. Memon, Image Steganography Concepts and Practice, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Singapore _2004
Mehdi Kharrazi, Husrev T. Sencar Nasir Memon. “Performance study of common image Steganography and steganalysis techniques.” Journal of Electronic Imaging 15(4),041104 (Oct–Dec 2006)
SecondLieutentJ.caldwell,“Steganography”,UnitedStatesAirForce,http://www.stsc.hill.af.mil /crosstalk/2003/caldwell.pdf, June2003.
V.Kavitha , K.S Easwarakumar. “Enhancing Privacy in Arithmetic Coding” ICGST-AIML Journal, Volume 8, Issue I, pp. 23-28, June 2008.
Miss Anuradaha
DCRUST,Murthal - India
anu107sharma@gmail.com
Miss Nidhi Sharma
Banasthali Vidyapeeth Bansthali - India
Miss Rimple gilhotra
Banasthali Vidyapeeth Bansthali - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS