Open Access   Article Go Back

Enhanced Steganography using K-MATRIX

K.K. ARORA1 , G. GANDHI2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-6 , Page no. 50-53, Jun-2014

Online published on Jul 03, 2014

Copyright © K.K. ARORA, G. GANDHI . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.K. ARORA, G. GANDHI, “Enhanced Steganography using K-MATRIX,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.50-53, 2014.

MLA Style Citation: K.K. ARORA, G. GANDHI "Enhanced Steganography using K-MATRIX." International Journal of Computer Sciences and Engineering 2.6 (2014): 50-53.

APA Style Citation: K.K. ARORA, G. GANDHI, (2014). Enhanced Steganography using K-MATRIX. International Journal of Computer Sciences and Engineering, 2(6), 50-53.

BibTex Style Citation:
@article{ARORA_2014,
author = {K.K. ARORA, G. GANDHI},
title = {Enhanced Steganography using K-MATRIX},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2014},
volume = {2},
Issue = {6},
month = {6},
year = {2014},
issn = {2347-2693},
pages = {50-53},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=195},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=195
TI - Enhanced Steganography using K-MATRIX
T2 - International Journal of Computer Sciences and Engineering
AU - K.K. ARORA, G. GANDHI
PY - 2014
DA - 2014/07/03
PB - IJCSE, Indore, INDIA
SP - 50-53
IS - 6
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3548 3356 downloads 3601 downloads
  
  
           

Abstract

Information hiding for security in data transmission is in the air as long as the conversion of data before sending it. Steganography is the art and the science of hiding information or data by embedding within other. Steganography works by replacing bits of useless or unused data in various files (graphics, sound, text or even floppy disks) through LSB technique and this hidden data can be plain text, cipher text or images. But this technique usually takes more time if encryption is done first for improving its security. The aim of this paper is to hide the data after encrypting it through new approach called K-Matrix, which will provide less time complexity than the existing technique for cryptography.

Key-Words / Index Term

Image Steganography, K-Matrix, Cryptography, LSB, Enhanced Least Significant Bit, Information hiding

References

[1] Rupinder Kaur and Deepak Aggarwal�Analysis of Secure Text Embedding using Steganography� International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 2, January 2013.
[2] N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26�34.
[3] Bhavana. S and K. L. Sudha �Text Steganography using LSB Insertion Method along with chaos thoery�
[4] Samir Kumar Bandyopadhyay, and Tai-hoon Kim �Text Steganography: A Novel Approach�, International Journal of Advanced Science and Technology, Vol. 3, February, 2009.
[5] Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Steganography Using Least Signicant Bit Algorithm �International Journal of Engineering Research and Applications (IJERA)� ISSN: 2248-9622, Vol. 2, Issue 3, May-Jun 2012.
[6] M. Pavani1, S. Naganjaneyulu2, C. Nagaraju �A Survey on LSB Based Steganography Methods�International Journal Of Engineering And Computer Science, Volume 2 Issue 8 August, 2013.
[7] Shailender Gupta , Ankur Goyal, Bharat Bhushan �Information Hiding Using Least Significant Bit Steganography and Cryptography� I.J.Modern Education and Computer Science, Published Online June 2012 in MECS.