STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM
The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this ciphe...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2013-03-01
|
Series: | ICTACT Journal on Communication Technology |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/IJCT_March(2013)_Paper_4_685_690.pdf |
id |
doaj-f783af723b134d5f83f7f96748d11ddf |
---|---|
record_format |
Article |
spelling |
doaj-f783af723b134d5f83f7f96748d11ddf2020-11-25T02:09:18ZengICT Academy of Tamil NaduICTACT Journal on Communication Technology0976-00912229-69482013-03-0141685690STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHMR.S. Gutte0Y.D. Chincholkar1P.U. Lahane2Department of Electronics and Telecommunications Engineering, Dnyanganga College of Engineering and Research, IndiaDepartment of Electronics and Telecommunications Engineering, Sinhgad College of Engineering, IndiaDepartment of Electronics and Telecommunications Engineering, RMD Sinhgad School of Engineering, IndiaThe Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab.http://ictactjournals.in/paper/IJCT_March(2013)_Paper_4_685_690.pdfSteganographyCryptographyEncryptionDecryptionExtended Square Substitution Algorithm |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
R.S. Gutte Y.D. Chincholkar P.U. Lahane |
spellingShingle |
R.S. Gutte Y.D. Chincholkar P.U. Lahane STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM ICTACT Journal on Communication Technology Steganography Cryptography Encryption Decryption Extended Square Substitution Algorithm |
author_facet |
R.S. Gutte Y.D. Chincholkar P.U. Lahane |
author_sort |
R.S. Gutte |
title |
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM |
title_short |
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM |
title_full |
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM |
title_fullStr |
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM |
title_full_unstemmed |
STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM |
title_sort |
steganography for two and three lsbs using extended substitution algorithm |
publisher |
ICT Academy of Tamil Nadu |
series |
ICTACT Journal on Communication Technology |
issn |
0976-0091 2229-6948 |
publishDate |
2013-03-01 |
description |
The Security of data on internet has become a prior thing. Though any message is encrypted using a stronger cryptography algorithm, it cannot avoid the suspicion of intruder. This paper proposes an approach in such way that, data is encrypted using Extended Substitution Algorithm and then this cipher text is concealed at two or three LSB positions of the carrier image. This algorithm covers almost all type of symbols and alphabets. The encrypted text is concealed variably into the LSBs. Therefore, it is a stronger approach. The visible characteristics of the carrier image before and after concealment remained almost the same. The algorithm has been implemented using Matlab. |
topic |
Steganography Cryptography Encryption Decryption Extended Square Substitution Algorithm |
url |
http://ictactjournals.in/paper/IJCT_March(2013)_Paper_4_685_690.pdf |
work_keys_str_mv |
AT rsgutte steganographyfortwoandthreelsbsusingextendedsubstitutionalgorithm AT ydchincholkar steganographyfortwoandthreelsbsusingextendedsubstitutionalgorithm AT pulahane steganographyfortwoandthreelsbsusingextendedsubstitutionalgorithm |
_version_ |
1724924695249158144 |