Message Passing Using Cryptography and Steganography (Record no. 16554)

MARC details
000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220406110843.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220406b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 9904
Author Kaki Leela Prasad
245 ## - TITLE STATEMENT
Title Message Passing Using Cryptography and Steganography
250 ## - EDITION STATEMENT
Volume, Issue number Vol.8(1), Jan-Jun
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Nagercoil
Name of publisher, distributor, etc. i-manager's
Year 2021
300 ## - PHYSICAL DESCRIPTION
Pagination 8-15p.
520 ## - SUMMARY, ETC.
Summary, etc. main aim of this paper is to make sure that the message which is sent from the sender to the receiver side is not accessed by any intruder. To ensure that the message is reached safely, we are first using cryptography followed by steganography, that is first the message will be encrypted with the help of the proposed encryption algorithm. Later, the encrypted message is hidden in an image (QR code) and this message is sent to the receiver side for decryption. To the best of our knowledge, the techniques discussed in this paper have not been tried out anywhere, at least in the combination we as a team have implemented. The idea is simple: firstly, the message is encrypted using the algorithm we have developed. The encrypted text is of double the length of the original message, and is jumbled. This helps in fooling the intruder further. The encryption is based on a key generated from a password. Two levels of authentication exist: password, and the key generated based on the password, which will enhance the security of the message. Secondly, we hide the message in the QR code. QR code is generated using Python language. We have generated QR code in three different extensions, they are SVG, EPS and PNG. On the receiver's side, the text is extracted from the QR code and is decrypted. Usage of the QR code is comparatively more reliable, and the limit of the encrypted message hidden in the QR Code has been validated. The whole idea was implemented and tested in Linux environment.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4622
Topical term or geographic name entry element Computer Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 16319
Co-Author Rao, Muppidi Somasundara
773 0# - HOST ITEM ENTRY
Title i-manager's journal on cloud computing (JCC)
International Standard Serial Number 2349-6835
Place, publisher, and date of publication Nagercoil i-manager Publication
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://imanagerpublications.com/article/18455/
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     School of Engineering & Technology School of Engineering & Technology Archieval Section 06/04/2022   2022-0700 06/04/2022 06/04/2022 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.