Applications Secure Data Transmission using Dual Steganographic Approach
Contributor(s)
The Pennsylvania State University CiteSeerX Archives
Full record
Show full item recordOnline Access
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.7165http://ijsaa.org/8011211.pdf
Abstract
Abstract — Security is an issue that is more sensitive in a message transmission due to the open nature and lack of morality in humans. In this paper we used different steganographic techniques for keeping a message secretly. Current research efforts follow a hierarchical approach. It is using steganographic approach or cryptographic approach or else both. Despite of that several authentication mechanisms are proposed due to attackers are enhancing the information from the secure message. Hence in the proposed method used genetic operator crossover (GOC) for encrypting the real message. Then, the cipher Text is eliding into the meaning full sentence using cheating text method. To improve the security of a real message again the result, cheating text is hidden into a message using word mapping method (WMM). Security of a message will improve with this approach. It can achieve by improving the computation complexity and conquering of cryptography and dual steganographic techniques.Date
2012-04-14Type
textIdentifier
oai:CiteSeerX.psu:10.1.1.219.7165http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.7165