ABSTRACT
The present scenario has observed a huge growth in
communications. Few Applications say online banking,
mobile banking, military communication, smartcards
and many more have taken security in account as most
desirable stuff. Cryptography and steganography are
two methods are available secure data. But, to have the
highly secure requirement for highly confidential data
of todays applications, highly secure and significant
hardware algorithms are necessity. So to avoid such
type of problem proposed work has given new theory to
combination of both the methods that is cryptography
and steganography. With these techniques the problems
of both the methods can be solved. The con of
cryptography is that it is very easy to detect and the
problem with steganography is that it is simpler to decrypt. So by using addition of both the problem of each
can be used as advantage of each other.
1. INTRODUCTION
www.ijsret.org
1032
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 6, September 2014
2. METHODOLOGY
DATA
KEY
DAT
A1
DAT
A2
DAT
A3
DATA
INVERSE
KEY
GENERA
TOR
KEY
KASUMI
Decryptio
n
DATA1
DATA
2
DATA3
New
proposed
Image
Steganog
raphy
KEY
GENERATO
R
KASUMI
Encryption
KE
Y2
New
proposed
Audio
Steganog
raphy
K
E
Y
1
New
proposed
Image
Steganogra
K
E
Y
1
KEY3
KEY
2
phy
New
proposed
Audio
Steganogra
phy
Bit
stre
am
data
KEY3
Ima
ge
jpg
file
Audi
o
wav
file
Image
jpg
file
Audio
wav
file
1033
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 6, September 2014
3. RESULTS
Figure 3 shown below shows the results observed for
the KASUMI data encryption for 64 bit means 8 bytes.
4. CONCLUSIONS
Information security is required for confidential data
transfer. Steganography is type or can say the ways
used for secure transmission of secrete information.
Proposed architecture for data transmission with highly
level of security has achieved it original objective and
the overall avalanche has been improved and the SNR
has been improved. Hence one can conclude that
proposed architecture produces very high level of
security because of it is using multiple levels of
encryption. So combination of both can be used so that
confidentiality, data integrity, authentication, and nonrepudiation of the data can be maintained.
REFERENCES
Figure 3: the KASUMI data Encryption
1.
Harish Kumar and Anuradha has published
paper in Third International Conference on IEEE,
Computing
Communication
&
Networking
Technologies (ICCCNT), 2012, entitle Enhanced LSB
technique for audio Steganography
2.
Altaay and Alaa A. Jabbar and Shahrin Bin
Sahib along with Mazdak Zamani has published paper
International Conference on IEEE, Advanced Computer
Science Applications and Technologies (ACSAT),
2012, entitle, An Introduction to Image
Steganography Techniques,
3.
V. Saravanan, A. Neeraja, has published paper
in IEEE, Proceedings of 7'h International Conference
on Intelligent Systems and Control (ISCO 2013), entitle
Security Issues in Computer Networks and
Stegnography.
4.
Imran Sarwar Bajwa, Rubata Riasat has
published paper in 2011 IEEE, entitle A New Perfect
Hashing based Approach for Secure Stegnograph
5.
Prof. Samir Kumar Bandyopadhyay
and
Barnali Gupta Banik, has published paper in
International Journal of Emerging Trends &
www.ijsret.org
1034
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 6, September 2014
August
2012,entitle
Multi-Level
steganographic algorithm for audio steganography
using LSB modification and parity encoding
technique,
6.
Hemalatha S, U Dinesh Acharya, Renuka A,
Priya R. Kamath, has published paper in Signal &
Image Processing : An International Journal (SIPIJ)
Vol.4, No.1, February 2013,entitle A secure and high
capacity steganography technique.
7. Debnath Bhattacharyya, Poulami Das, Samir
Kumar Bandyopadhyay, and Tai-hoon Kim, has
published paper in International Journal of Advanced
Science and Technology Vol. 3, February, 2009, entitle
Text Steganography: A Novel Approach
www.ijsret.org
1035