Fig 2 - uploaded by Anupam Kumar Bairagi
Content may be subject to copyright.
The process of Private-Key Cryptography

The process of Private-Key Cryptography

Source publication
Article
Full-text available
The message is the composition of some character. Every character of the message can be represented as an ASCII value, which is either even or odd. Depending on this evenness or oddness, the character is encrypted differently. This paper describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting b...

Similar publications

Article
Full-text available
A new technique of hiding a speech signal clip inside a digital color image is proposed in this paper to improve steganography security and loading capacity. The suggested technique of image steganography is achieved using both spatial and cepstral domains, where the Mel-frequency cepstral coefficients (MFCCs) are adopted, as very efficient feature...
Article
Full-text available
The concealment of information in the image can be done with some specific techniques. One of the techniques used is End of File. In the insertion of this information, a series of characters will be converted to ASCII code and each byte will be inserted at the end of the RGB image in descending order. The insertion can be done in Red, Green, Blue o...
Article
Full-text available
While cryptography keeps unknown the hidden content of information, steganography provides a higher level of data security by making even the existence of hidden information secret, it is the art of dissimulating information in digital media considering it as an unremarkable support. In this paper we propose a new two methods of image steganography...
Conference Paper
Full-text available
Data security means protecting data, such as a database, file, from destructive forces and the unwanted actions of unauthorized users. Since, the use of internet is getting popular day by day, data security for efficient and reliable communication has become an important issue. This is the first step towards the introduction of modern day cryptogra...
Article
Full-text available
The data security of an information is predominant in the digital world and gaining lot of importance. Cryptography and steganography are widely used in providing security to an information. In the proposed algorithm, the image encryption and steganography are performed using Knight’s move in the game of chess called Knight’s Tour Algorithm. Minimu...

Citations

... It also revealed the fact that the security of the message can be ensured by encrypting the message using grey code and embedding with the picture. Since the cipher text is easy to crack when attacked, even or odd characteristics of the ASCII value can improve the level of security from a much broader perspective [22]. In later stages, another technique was brought to light that is known as steganography scheme on the basis of Genetic algorithm and integer wavelet transform [23]. ...
Conference Paper
The privacy of transmitting data in the era of super-fast internet and high-volume data generation has become a tough job. To solve this problem, the combination of steganography and visual cryptography together is considered. Steganography is the process of concealing some data inside any form of digital data. The proposed method takes the original image and the secret message is encoded in its LSB (least significant bits), where genetic algorithm modifies the pixel values of encrypted image, therefore making the secret of the message tough to crack and then secretly hides the data in the original image and it is detected after undergoing visual cryptography which helps to encrypt visual information so that on decryption, data or the information appears as an image. The aim of this model is to design an efficient and secured algorithm for better reliability, security and efficiency for a secret message.
... A SHS_256 is used to calculate files integrity before being hidden and after retrieving that produce exact hash values. Bairagi [9] produced a security system using even-odd encryption method depends on ASCII code and converting the encrypted massage with Gray code then embedding the message in a picture to burden cryptanalyst's job. Qiang Zhang et al. [10] proposed algorithm based on DNA sequence addition combining with chaos method for image encryption .The secret image is encoded by DNA sequence matrix, then this matrix segmented and added togather, A complement operation is accomplished using two Logistic maps to the DNA sequence and DNA sequence matrix that produced is decoded to obtain the encrypted image. ...
Conference Paper
Full-text available
Availability of data anywhere and ease of access and interception the information in different forms as text ,images ,video…etc., create an important issue represented by data security both steganography and encryption was appeared to achieve this mission. In this paper a hybrid technique was used to secure messages of grayscale and colored images in RGB cover image by encrypting the message with Hill encrypting algorithm and hiding it by LSB method in RGB image with random locations generated by seed number and taking three LSB bits , many different sizes of images was experimented and results was analyzed by PSNR , Correlation and histogram analysis methods , all proves the efficiency of proposed technique in securing images and.
... Researchers in [11] [12] [13] have proposed image encryption algorithms by utilizing ASCII code, binary conversion, and Gray Code. ...
Conference Paper
Full-text available
In today's era with the fast adaption of internet communication, the exchange of data among individuals, government sectors and corporate levels have increased. Unauthorized users are always on the outlook to steal the conversations that take place on the internet Therefore; protecting data during transmission from unauthorized users is the most important need of time. Hence, the requirement to secure this information exchange has become more hectic task for IT professionals. Cryptography is the science of encrypting data which keeps the message safe from unauthorized users. In this paper, we have proposed a new cryptographic algorithm using ASCII values and Gray Code (AGC) to protect data during communication. Moreover, drawbacks of previous ASCII algorithms and future work is described.
... Cryptography and steganography are the most widely used techniques to overcome data security, so they received more attention from the research community. Bairagi [6] describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by using Gray code and embedding of picture that can secure the message and thus makes cryptanalyst's job difficult. In [7] a secret data communication system was presented, it employs RSA and AES key to encrypt the data, after that the encrypted data is embedded into the cover image using smart LSB pixel mapping and data rearrangement method. ...
... Bairagi [8] describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by using Gray code and embedding of picture that can secure the message and thus makes cryptanalyst's job difficult. ...
Data
Full-text available
... Bairagi [8] describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by using Gray code and embedding of picture that can secure the message and thus makes cryptanalyst's job difficult. ...
Conference Paper
Full-text available
The flexibility to store unlimited data without any worry about storage limitations available at our disposal and the freedom to use it as and when required from anywhere in the world makes cloud computing the most preferred technology & platform to store and transfer data. Organizations and individual users are now very much comfortable to let their all-important data and software reside on the cloud servers and make themselves free from all the concerns of storage and security. However, every flexibility or benefits comes at a price and cloud computing too is not an exception. The threat of user's privacy, data confidentiality & integrity and data safety are always looming around. Among all of these, the secure transfer of data from organization's premises to the cloud servers is of utmost importance. So many encryption techniques and algorithms have been proposed by researchers in recent times to move data securely from their end to the servers. In this research paper, we propose a design for cloud architecture which ensures secure data transmission from the client's organization to the servers of the Cloud Service provider (CSP). We have used a combined approach of cryptography and steganography because it will provide a two way security to the data being transmitted on the network. First, the data gets converted into a coded format through the use of encryption algorithm and then this coded format data is again converted into a rough image through the use of steganography. Moreover, steganography also hides the existence of the message, thereby ensuring that the chances of data being tampered are minimal.
... This algorithm operates when the length of input and the length of key are same. (Anupam Kumar Bairagi, 2011) describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by using Gray code and embedding with picture can secured the message and thus makes cryptanalyst's job difficult. ...
... Kandar, and Maiti [8] proposed a technique of well-known k-n secret sharing for color images using a variable length key with share division using random numbers. Bairagi [9] describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by using Gray code and embedding of picture that can secure the message and thus makes cryptanalyst's job difficult. ...
Conference Paper
Full-text available
Cryptography and Steganography are the two popular methods for secure data hiding and transmission available broadly. The techniques used information in order to cipher or cover their existence respectively. Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. While Steganography is the art and science of hiding communication, a stenographic system, thus embeds hidden content in the unremarkable cover media so as not to provoke an eavesdropper's suspicion. In steganography the secret message embeds in a harmless looking cover such as a digital image file, then the image file is transmitted. The primary purpose of this paper is to improve a new method of hiding secret messages in the image, possibly by combining steganography and cryptography. A new encryption technique is used in order to lower the space of representing the characters. LSB method is used to hide the encrypted message into images. PSNR and MSE are used for measuring the quality of images; the results showed that the proposed method gives better results than simple LSB with higher PSNR lower MSE.
... Cryptography is the system where encryption and decryption techniques are used to the network and computer for security of the file. Encryption means the change of original information (plain text) into another form (cipher text) by some operations to make the file unreadable and decryption means the techniques of getting the original information by some operations from the encrypted file [1]. Key based algorithms use an encryption key to encrypt a file. ...
... Currently there are several types of key based encryption algorithms such as: DES, RSA, PGP, Elliptic curve and others but all of these algorithms depend on high mathematical manipulations [2,3]. Some methods are not suitable for any file [1,4]. The proposed method will overcome the size problem. ...
Article
Full-text available
This paper presents an ASCII based Encryption/Decryption application that is applicable to any type of files; for example: image files, data files, documentation files, audio files, video files etc. It introduces a method of encryption by translating ASCII value of characters of the file opened in binary mode. ASCII value of every character of the file is translated by an integer which is generated irregularly from the key. Size of the encrypted file remains same as original file and required time is also very less.
... Shyamalendu Kandar [14] proposed a technique of well known k-n secret sharing on color images using a variable length key with share division using random number. Anupam [15] describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by using Gray code and embedding with picture can secured the message and thus makes cryptanalyst's job difficult. ...
Article
Full-text available
The proposed system highlights a novel approach for creating a secure steganographic method using genetic algorithm and visual cryptography for robust encryption in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security towards the encrypted image. The proposed method encodes the secret message in least significant bits of the original image, where the pixels values of the encrypted image are modified by the genetic algorithm to retain their statistic characters, thereby making the detection of secret of message difficult. Use of Genetic algorithm has compelled the system for enhancing the security using optimal selection, mutation, and cross over. The proposed system hides data in a real image and achieve its detection after under went to visual cryptographic. The implementation is done in java platform which shows that the proposed system has better resilienc by considering the Steganalysis and bench marking with optimal visual standards.