Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 131))

  • 2895 Accesses

Abstract

With the advancement of the computer technology and networking, tons of secret information is being transmitted on the Internet. However secret message are at high risk of stealing because these messages seek attention while they are being transmitted. Therefore achieving safe exchange of secret message is an important field of research. Though symmetric key cryptographic methods offer quite high level of security but they require costly hardware to implement these methods. Stenography is a communication method which hide secret message in the cover to protect it from the potential hacker. The safest method to prevent secret message from leaking to first encrypt it and then hide this message in the cover We propose a Secure Intelligence Sharing Scheme to integrate with high hiding capacity and imperceptibility. The proposed scheme uses AES as cryptographic solution and hash type one-way function to store metadata about cover and secret message. The proposed scheme uses JPEG compression technique to control size of the transmitted message. Our experiment is performed using variety of cover data and secret messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chung, Y.Y., Fang, F.X.: Development of video watermarking for MPEG2 video. In: TENCON (2006), doi:10.1109/TENCON.2006.343843

    Google Scholar 

  2. Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. In: ASPLOS (2000), doi:10.1145/378995.379238

    Article  Google Scholar 

  3. Davies, D.W., Price, W.L.: Security for Computer Networks. Wiley (1989)

    Google Scholar 

  4. Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol Version 3.0., Netscape, Inc. (1996), http://home.netscape.com/eng/ssl3/draft302.txt

  5. Nechvatal, J., et al.: Report on the Development of the advanced encryption standard (AES). NIST (2000)

    Google Scholar 

  6. Advanced Encryption Standard (AES) Development Effort. US Government, http://csrc.nist.gov/encryption/aes/

  7. Zhang, T., Ping, X.: A new approach to reliable detection of LSB stegano-graphy in natural images. Signal Processing 83, 2085–2093 (2003)

    Article  Google Scholar 

  8. Fridrich, J., Goljan, M.: Practical steganalysis of digital images-state of the art. In: Proc. SPIE, pp. 1–13 (2002)

    Google Scholar 

  9. Kurak, C., McHugh, J.: A Cautionary Note on Image Downgrading. IEEE (1992), doi:10.1109/CSAC.1992.228224

    Google Scholar 

  10. Wu, N., Hwang, M.: Data Hiding: Current Status and Key Issues. IJNS 4(1), 1–9 (2007)

    Google Scholar 

  11. Johnson, N.F., Jajodia, S.: Staganalysis: The Investigation of Hiding In-formation. IEEE (1998), doi:10.1109/IT.1998.713394

    Google Scholar 

  12. Anderson, R.J., Fabien, A.P.: Petitcolas: On The Limits of Steganography. IEEE JSA 16(4), 474–481 (1998)

    Google Scholar 

  13. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen, vol. 31(2), pp. 26–34. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  14. Channalli, S., Jadhav, A.: Steganography:An Art of Hiding Data. IJCSE 1(3), 137–141 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vineeta Khemchandani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer India Pvt. Ltd.

About this paper

Cite this paper

Khemchandani, V., Purohit, G.N. (2012). Secure and Imperceptible Intelligence Message Sharing Scheme. In: Deep, K., Nagar, A., Pant, M., Bansal, J. (eds) Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Advances in Intelligent and Soft Computing, vol 131. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0491-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0491-6_12

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-0490-9

  • Online ISBN: 978-81-322-0491-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics