STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM

The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this ciphe...

Full description

Bibliographic Details
Main Authors: R.S. Gutte, Y.D. Chincholkar, P.U. Lahane
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2013-03-01
Series:ICTACT Journal on Communication Technology
Subjects:
Online Access:http://ictactjournals.in/paper/IJCT_March(2013)_Paper_4_685_690.pdf
id doaj-f783af723b134d5f83f7f96748d11ddf
record_format Article
spelling doaj-f783af723b134d5f83f7f96748d11ddf2020-11-25T02:09:18ZengICT Academy of Tamil NaduICTACT Journal on Communication Technology0976-00912229-69482013-03-0141685690STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHMR.S. Gutte0Y.D. Chincholkar1P.U. Lahane2Department of Electronics and Telecommunications Engineering, Dnyanganga College of Engineering and Research, IndiaDepartment of Electronics and Telecommunications Engineering, Sinhgad College of Engineering, IndiaDepartment of Electronics and Telecommunications Engineering, RMD Sinhgad School of Engineering, IndiaThe Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab.http://ictactjournals.in/paper/IJCT_March(2013)_Paper_4_685_690.pdfSteganographyCryptographyEncryptionDecryptionExtended Square Substitution Algorithm
collection DOAJ
language English
format Article
sources DOAJ
author R.S. Gutte
Y.D. Chincholkar
P.U. Lahane
spellingShingle R.S. Gutte
Y.D. Chincholkar
P.U. Lahane
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
ICTACT Journal on Communication Technology
Steganography
Cryptography
Encryption
Decryption
Extended Square Substitution Algorithm
author_facet R.S. Gutte
Y.D. Chincholkar
P.U. Lahane
author_sort R.S. Gutte
title STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
title_short STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
title_full STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
title_fullStr STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
title_full_unstemmed STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
title_sort steganography for two and three lsbs using extended substitution algorithm
publisher ICT Academy of Tamil Nadu
series ICTACT Journal on Communication Technology
issn 0976-0091
2229-6948
publishDate 2013-03-01
description The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab.
topic Steganography
Cryptography
Encryption
Decryption
Extended Square Substitution Algorithm
url http://ictactjournals.in/paper/IJCT_March(2013)_Paper_4_685_690.pdf
work_keys_str_mv AT rsgutte steganographyfortwoandthreelsbsusingextendedsubstitutionalgorithm
AT ydchincholkar steganographyfortwoandthreelsbsusingextendedsubstitutionalgorithm
AT pulahane steganographyfortwoandthreelsbsusingextendedsubstitutionalgorithm
_version_ 1724924695249158144