Abstract
Within the past several years, there has been an exponential increase in the research community and industry’s focus towards information hiding techniques as opposed to the traditional cryptography area. The goal of Steganography is to conceal information, in plain sight. Providing security to the data means the third party cannot interpret the actual information. When providing authentication to the data then only authorized persons can interpret the data. This system deals with secure transmission of data. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. To provide authentication a four bit dynamic key is generated for every four characters of the encrypted data and the key is also maintained in the data itself. In this system we implement security using steganography. i.e. hiding large amount of information in an image without disturbing the image clarity and its pixels.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding-A Survey. Proceedings of the IEEE, Special Issue on Protection of Multimedia Content 87(7), 1062–1078 (1999)
Anderson, R., Petitcolas, F.: On the Limits of Steganography. University of Cambridge, Computer Laboratory, Cambridge (September 1997); Published in IEEE Journal on Special Areas in Communications 16(4), 463–473 (May 1998)
Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998), http://www.jjtc.com/ihws98/jjgmu.html
Ravi Kumar, B., Murti, P.R.K.: Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology. International Journal on Computer Science and Engineering (IJCSE) 3(7), 2818–2827 (2011)
Ravi Kumar, B., Murti, P.R.K., Hemanth Kumar, B.: An Authenticated Bit Shifting and Stuffing (BSS) Methodology for Data Security. Computer Engineering and Intelligent Systems 2(3), 94–104 (2011)
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the unseen. IEEE Computer 31(2), 26–34 (1998)
Marvel, L.M., Boncelet Jr., C.G., Retter, C.: Spread Spectrum Steganography. IEEE Transactions on Image Processing 8, 08 (1999)
Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ravi Kumar, B., Murti, P.R.K., Hemanth Kumar, B. (2012). An Authenticated BSS Methodology for Data Security Using Steganography. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27317-9_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-27317-9_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27316-2
Online ISBN: 978-3-642-27317-9
eBook Packages: Computer ScienceComputer Science (R0)