Title :
Steganography using the twelve square substitution cipher and an index variable
Author :
Swain, Gandharba ; Lenka, Saroj Kumar
Author_Institution :
Dept. of IT, GMR Inst. of Technol., Rajam, India
Abstract :
In this paper we are proposing a technique for secret communication between Alice and Bob. We are using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th bit locations or 7th and 8th bit locations or 6 and 8 bit locations of the different pixels (bytes) of the carrier image depending on the value of an index variable. Here the 8 bit means the least significant bit (LSB) location, the 7 bit means the LSB minus one location and the 6 bit means the LSB minus two location. The index variable value can be 0 or 1 or 2. The index variable value will change from 0 to 1 or 1 to 2 or 2 to 0 after each embedding. The initial value of the index variable depends upon the length of the cipher text. After embedding the resultant image should be sent to the receiver and receiver should retrieve the cipher text from the said locations and then decrypt by using the twelve square cipher algorithm to get the secret message. The embedding locations are not same in all pixels, so it is a stronger approach. The algorithm is implemented using Java programming language. The experimental results says that the algorithm performs well.
Keywords :
cryptography; image coding; steganography; Java programming language; cryptography; least significant bit location; secret communication; secret message; steganography; twelve square substitution cipher algorithm; Encryption; Image color analysis; Indexes; Pixel; Receivers; Steganography; cryptography; decryption; encryption; twelve square cipher;
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
DOI :
10.1109/ICECTECH.2011.5941806