Message Passing Using Cryptography and Steganography

Kaki Leela Prasad*, Muppidi Somasundara Rao**, Chandra Sekhar Musinana***
*,*** Department of Computer Science and Engineering, Maharaj Vijayaram Gajapathi Raj College of Engineering, Andhra Pradesh, India.
** Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India.
Periodicity:January - June'2021
DOI : https://doi.org/10.26634/jcc.8.1.18455

Abstract

The main aim of this paper is to make sure that the message which is sent from the sender to the receiver side is not accessed by any intruder. To ensure that the message is reached safely, we are first using cryptography followed by steganography, that is first the message will be encrypted with the help of the proposed encryption algorithm. Later, the encrypted message is hidden in an image (QR code) and this message is sent to the receiver side for decryption. To the best of our knowledge, the techniques discussed in this paper have not been tried out anywhere, at least in the combination we as a team have implemented. The idea is simple: firstly, the message is encrypted using the algorithm we have developed. The encrypted text is of double the length of the original message, and is jumbled. This helps in fooling the intruder further. The encryption is based on a key generated from a password. Two levels of authentication exist: password, and the key generated based on the password, which will enhance the security of the message. Secondly, we hide the message in the QR code. QR code is generated using Python language. We have generated QR code in three different extensions, they are SVG, EPS and PNG. On the receiver's side, the text is extracted from the QR code and is decrypted. Usage of the QR code is comparatively more reliable, and the limit of the encrypted message hidden in the QR Code has been validated. The whole idea was implemented and tested in Linux environment.

Keywords

Quick Response Code, Uniform Resource Locator, Compiler, Public Key Infrastructure, Pretty Good Privacy (PGP).

How to Cite this Article?

Prasad, K. L., Rao, M. S., and Musinana, C. S. (2021). Message Passing Using Cryptography and Steganography. i-manager's Journal on Cloud Computing, 8(1), 8-15. https://doi.org/10.26634/jcc.8.1.18455

References

[1]. Babu, K. R., Kumar, S. U., & Babu, A. V. (2010). A survey on cryptography and steganography methods for information security. International Journal of Computer Applications, 12(2), 13-17.
[2]. Bharti, P., & Soni, R. (2012). A new approach of data hiding in images using cryptography and steganography. International Journal of Computer Applications, 58(18), 1- 5.
[3]. Bloisi, D. D., & Iocchi, L. (2007, March). Image based steganography and cryptography. In Proceedings of the Second International Conference on Computer Vision Theory and Applications (IFP/IA), (pp. 127-134).
[4]. Channalli, S., & Jadhav, A. (2009). Steganography an art of hiding data. International Journal on Computer Science and Engineering, 1(3), 137-141.
[5]. Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26- 34. https://doi.org/10.1109/MC.1998.4655281
[6]. Manoj, I. V. S. (2010). Cr yptography and steganography. International Journal of Computer Applications, 1(12), 63-68.
[7]. Prabhakaran, N., & Shanth, D. (2012). A new cryptic steganographic approach using video steganography. International Journal of Computer Applications, 49(7), 19- 23.
[8]. Rajyaguru, M. H. (2012). Crystography-combination of cryptography and steganography with rapidly changing keys. International Journal of Emerging Technology and Advanced Engineering, 2(10), 329-332.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.