"New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"
Title | "New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | S. Majumdar, A. Maiti, A. Nath |
Conference Name | 2015 International Conference on Computational Intelligence and Communication Networks (CICN) |
Date Published | Dec |
Publisher | IEEE |
ISBN Number | 978-1-5090-0076-0 |
Accession Number | 16248110 |
Keywords | android, Android mobile environment, Android phone, bit level columnar transposition method, Ciphers, Computer science, Computers, cryptanalysis, cryptography, encrypted secret message, Encryption, mobile radio, pubcrawl170102, QR code, QR codes, QRTM Code, secured steganography algorithm, smart phones, Standards, steganography, three-step security |
Abstract | Steganography is a method of hiding information, whereas the goal of cryptography is to make data unreadable. Both of these methodologies have their own advantages and disadvantages. Encrypted messages are easily detectable. If someone is spying on communication channel for encrypted message, he/she can easily identify the encrypted messages. Encryption may draw unnecessary attention to the transferred messages. This may lead to cryptanalysis of the encrypted message if the spy tries to know the message. If the encryption technique is not strong enough, the message may be deciphered. In contrast, Steganography tries to hide the data from third party by smartly embedding the data to some other file which is not at all related to the message. Here care is to be taken to minimize the modification of the container file in the process of embedding data. But the disadvantage of steganography is that it is not as secure as cryptography. In the present method the authors have introduced three-step security. Firstly the secret message is encrypted using bit level columnar transposition method introduced by Nath et al and after that the encrypted message is embedded in some image file along with its size. Finally the modified image is encoded into a QR Code TM. The entire method has also been implemented for the Android mobile environment. This method may be used to transfer confidential message through Android mobile phone. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7546273&isnumber=7546033 |
DOI | 10.1109/CICN.2015.329 |
Citation Key | 7546273 |
- encryption
- three-step security
- Steganography
- standards
- smart phones
- secured steganography algorithm
- QRTM Code
- QR codes
- QR code
- pubcrawl170102
- mobile radio
- android
- encrypted secret message
- Cryptography
- cryptanalysis
- Computers
- computer science
- Ciphers
- bit level columnar transposition method
- Android phone
- Android mobile environment