In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
%0 Journal Article
%1 bibhudendraacharyahimanshuagrawal2011combined
%A Bibhudendra Acharya, Himanshu Agrawal, Ankit Modi
%A Agrawal, Upendra Kumar
%D 2011
%E Das, Dr. Vinu V
%J International Journal on Network Security
%K cipher cryptography plaintext steganography stegoobject
%N 2
%P 3
%T Combined Implementation of Robust Cryptosystem
for Non-invertible Matrices based on Hill Cipher and
Steganography
%U http://doi.searchdl.org/01.IJNS.2.2.167
%V 2
%X In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
@article{bibhudendraacharyahimanshuagrawal2011combined,
abstract = {In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.},
added-at = {2012-09-25T08:25:36.000+0200},
author = {{Bibhudendra Acharya, Himanshu Agrawal}, Ankit Modi and Agrawal, Upendra Kumar},
biburl = {https://www.bibsonomy.org/bibtex/2d3164806bae39f51ed5e7a073fbe68c7/ideseditor},
editor = {Das, Dr. Vinu V},
interhash = {c6608c17887e0344974a48a29f3e3983},
intrahash = {d3164806bae39f51ed5e7a073fbe68c7},
journal = {International Journal on Network Security},
keywords = {cipher cryptography plaintext steganography stegoobject},
month = {April},
number = 2,
pages = 3,
timestamp = {2012-09-25T08:25:36.000+0200},
title = {Combined Implementation of Robust Cryptosystem
for Non-invertible Matrices based on Hill Cipher and
Steganography},
url = {http://doi.searchdl.org/01.IJNS.2.2.167},
volume = 2,
year = 2011
}