Message Passing Using Cryptography and Steganography (Record no. 16554)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220406110843.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 220406b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 9904 |
| Author | Kaki Leela Prasad |
| 245 ## - TITLE STATEMENT | |
| Title | Message Passing Using Cryptography and Steganography |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.8(1), Jan-Jun |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Nagercoil |
| Name of publisher, distributor, etc. | i-manager's |
| Year | 2021 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 8-15p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | main aim of this paper is to make sure that the message which is sent from the sender to the receiver side is not accessed by any intruder. To ensure that the message is reached safely, we are first using cryptography followed by steganography, that is first the message will be encrypted with the help of the proposed encryption algorithm. Later, the encrypted message is hidden in an image (QR code) and this message is sent to the receiver side for decryption. To the best of our knowledge, the techniques discussed in this paper have not been tried out anywhere, at least in the combination we as a team have implemented. The idea is simple: firstly, the message is encrypted using the algorithm we have developed. The encrypted text is of double the length of the original message, and is jumbled. This helps in fooling the intruder further. The encryption is based on a key generated from a password. Two levels of authentication exist: password, and the key generated based on the password, which will enhance the security of the message. Secondly, we hide the message in the QR code. QR code is generated using Python language. We have generated QR code in three different extensions, they are SVG, EPS and PNG. On the receiver's side, the text is extracted from the QR code and is decrypted. Usage of the QR code is comparatively more reliable, and the limit of the encrypted message hidden in the QR Code has been validated. The whole idea was implemented and tested in Linux environment. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4622 |
| Topical term or geographic name entry element | Computer Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 16319 |
| Co-Author | Rao, Muppidi Somasundara |
| 773 0# - HOST ITEM ENTRY | |
| Title | i-manager's journal on cloud computing (JCC) |
| International Standard Serial Number | 2349-6835 |
| Place, publisher, and date of publication | Nagercoil i-manager Publication |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://imanagerpublications.com/article/18455/ |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 06/04/2022 | 2022-0700 | 06/04/2022 | 06/04/2022 | Articles Abstract Database |