Visible to the public "New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"Conflict Detection Enabled

Title"New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"
Publication TypeConference Paper
Year of Publication2015
AuthorsS. Majumdar, A. Maiti, A. Nath
Conference Name2015 International Conference on Computational Intelligence and Communication Networks (CICN)
Date PublishedDec
PublisherIEEE
ISBN Number978-1-5090-0076-0
Accession Number16248110
Keywordsandroid, Android mobile environment, Android phone, bit level columnar transposition method, Ciphers, Computer science, Computers, cryptanalysis, cryptography, encrypted secret message, Encryption, mobile radio, pubcrawl170102, QR code, QR codes, QRTM Code, secured steganography algorithm, smart phones, Standards, steganography, three-step security
Abstract

Steganography is a method of hiding information, whereas the goal of cryptography is to make data unreadable. Both of these methodologies have their own advantages and disadvantages. Encrypted messages are easily detectable. If someone is spying on communication channel for encrypted message, he/she can easily identify the encrypted messages. Encryption may draw unnecessary attention to the transferred messages. This may lead to cryptanalysis of the encrypted message if the spy tries to know the message. If the encryption technique is not strong enough, the message may be deciphered. In contrast, Steganography tries to hide the data from third party by smartly embedding the data to some other file which is not at all related to the message. Here care is to be taken to minimize the modification of the container file in the process of embedding data. But the disadvantage of steganography is that it is not as secure as cryptography. In the present method the authors have introduced three-step security. Firstly the secret message is encrypted using bit level columnar transposition method introduced by Nath et al and after that the encrypted message is embedded in some image file along with its size. Finally the modified image is encoded into a QR Code TM. The entire method has also been implemented for the Android mobile environment. This method may be used to transfer confidential message through Android mobile phone.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7546273&isnumber=7546033
DOI10.1109/CICN.2015.329
Citation Key7546273