Normal view MARC view ISBD view

Message Passing Using Cryptography and Steganography

By: Kaki Leela Prasad.
Contributor(s): Rao, Muppidi Somasundara.
Publisher: Nagercoil i-manager's 2021Edition: Vol.8(1), Jan-Jun.Description: 8-15p.Subject(s): Computer EngineeringOnline resources: Click here In: i-manager's journal on cloud computing (JCC)Summary: main aim of this paper is to make sure that the message which is sent from the sender to the receiver side is not accessed by any intruder. To ensure that the message is reached safely, we are first using cryptography followed by steganography, that is first the message will be encrypted with the help of the proposed encryption algorithm. Later, the encrypted message is hidden in an image (QR code) and this message is sent to the receiver side for decryption. To the best of our knowledge, the techniques discussed in this paper have not been tried out anywhere, at least in the combination we as a team have implemented. The idea is simple: firstly, the message is encrypted using the algorithm we have developed. The encrypted text is of double the length of the original message, and is jumbled. This helps in fooling the intruder further. The encryption is based on a key generated from a password. Two levels of authentication exist: password, and the key generated based on the password, which will enhance the security of the message. Secondly, we hide the message in the QR code. QR code is generated using Python language. We have generated QR code in three different extensions, they are SVG, EPS and PNG. On the receiver's side, the text is extracted from the QR code and is decrypted. Usage of the QR code is comparatively more reliable, and the limit of the encrypted message hidden in the QR Code has been validated. The whole idea was implemented and tested in Linux environment.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
Articles Abstract Database Articles Abstract Database School of Engineering & Technology
Archieval Section
Not for loan 2022-0700
Total holds: 0

main aim of this paper is to make sure that the message which is sent from the sender to the receiver side is not accessed by any intruder. To ensure that the message is reached safely, we are first using cryptography followed by steganography, that is first the message will be encrypted with the help of the proposed encryption algorithm. Later, the encrypted message is hidden in an image (QR code) and this message is sent to the receiver side for decryption. To the best of our knowledge, the techniques discussed in this paper have not been tried out anywhere, at least in the combination we as a team have implemented. The idea is simple: firstly, the message is encrypted using the algorithm we have developed. The encrypted text is of double the length of the original message, and is jumbled. This helps in fooling the intruder further. The encryption is based on a key generated from a password. Two levels of authentication exist: password, and the key generated based on the password, which will enhance the security of the message. Secondly, we hide the message in the QR code. QR code is generated using Python language. We have generated QR code in three different extensions, they are SVG, EPS and PNG. On the receiver's side, the text is extracted from the QR code and is decrypted. Usage of the QR code is comparatively more reliable, and the limit of the encrypted message hidden in the QR Code has been validated. The whole idea was implemented and tested in Linux environment.

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha