Abstract
The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible for the snooping of Data at the same time. The ease, by which digital information can be duplicated and distributed, has led to the need for effective protection tools. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns. In this paper, an algorithmic approach is proposed in which along with the combination of cryptography and steganography (taken as security layers), an extra layer of security has been imposed in between them to obtain a completely secured data transmission scheme.
- Alfred. J. Menezes, Paul. C. Van Oorschot, Scott A. Venstone, Handbook of Applied Cryptography. Google ScholarDigital Library
- Niels Provos, Peter Honeyman, Hide and seek: Introduction to Steganography. Google ScholarDigital Library
- Neil F. Johnson and Sushil Jajodia, Exploring Steganography: seeing the unseen.Google Scholar
- Stefan Katzenbeisser, Fabien, A. P. Information Hiding Techniques for Steganography and Digital Watermarking. Google ScholarDigital Library
- Andreas Westfield, F5-A Steganography Algorithm.Google Scholar
Index Terms
- Triple layer data security
Recommendations
A lossless robust data hiding scheme
This paper presents a lossless robust data hiding scheme. The original cover image can be recovered without any distortion after the hidden data have been extracted if the stego-image remains intact, and on the other hand, the hidden data can still be ...
High-capacity index based data hiding method
In this paper, a high-capacity data hiding method based on the index function is presented. The cover image is divided into non-overlapping sub-blocks, and the basis pixel is calculated by the index function. Difference values with other pixel-pairs are ...
Lossless data embedding: new paradigm in digital watermarking
One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or ...
Comments