Abstract
With the advancement of the computer technology and networking, tons of secret information is being transmitted on the Internet. However secret message are at high risk of stealing because these messages seek attention while they are being transmitted. Therefore achieving safe exchange of secret message is an important field of research. Though symmetric key cryptographic methods offer quite high level of security but they require costly hardware to implement these methods. Stenography is a communication method which hide secret message in the cover to protect it from the potential hacker. The safest method to prevent secret message from leaking to first encrypt it and then hide this message in the cover We propose a Secure Intelligence Sharing Scheme to integrate with high hiding capacity and imperceptibility. The proposed scheme uses AES as cryptographic solution and hash type one-way function to store metadata about cover and secret message. The proposed scheme uses JPEG compression technique to control size of the transmitted message. Our experiment is performed using variety of cover data and secret messages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chung, Y.Y., Fang, F.X.: Development of video watermarking for MPEG2 video. In: TENCON (2006), doi:10.1109/TENCON.2006.343843
Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. In: ASPLOS (2000), doi:10.1145/378995.379238
Davies, D.W., Price, W.L.: Security for Computer Networks. Wiley (1989)
Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol Version 3.0., Netscape, Inc. (1996), http://home.netscape.com/eng/ssl3/draft302.txt
Nechvatal, J., et al.: Report on the Development of the advanced encryption standard (AES). NIST (2000)
Advanced Encryption Standard (AES) Development Effort. US Government, http://csrc.nist.gov/encryption/aes/
Zhang, T., Ping, X.: A new approach to reliable detection of LSB stegano-graphy in natural images. Signal Processing 83, 2085–2093 (2003)
Fridrich, J., Goljan, M.: Practical steganalysis of digital images-state of the art. In: Proc. SPIE, pp. 1–13 (2002)
Kurak, C., McHugh, J.: A Cautionary Note on Image Downgrading. IEEE (1992), doi:10.1109/CSAC.1992.228224
Wu, N., Hwang, M.: Data Hiding: Current Status and Key Issues. IJNS 4(1), 1–9 (2007)
Johnson, N.F., Jajodia, S.: Staganalysis: The Investigation of Hiding In-formation. IEEE (1998), doi:10.1109/IT.1998.713394
Anderson, R.J., Fabien, A.P.: Petitcolas: On The Limits of Steganography. IEEE JSA 16(4), 474–481 (1998)
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen, vol. 31(2), pp. 26–34. IEEE Computer Society Press, Los Alamitos (1998)
Channalli, S., Jadhav, A.: Steganography:An Art of Hiding Data. IJCSE 1(3), 137–141 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer India Pvt. Ltd.
About this paper
Cite this paper
Khemchandani, V., Purohit, G.N. (2012). Secure and Imperceptible Intelligence Message Sharing Scheme. In: Deep, K., Nagar, A., Pant, M., Bansal, J. (eds) Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Advances in Intelligent and Soft Computing, vol 131. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0491-6_12
Download citation
DOI: https://doi.org/10.1007/978-81-322-0491-6_12
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-0490-9
Online ISBN: 978-81-322-0491-6
eBook Packages: EngineeringEngineering (R0)