ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SECURE LOCATION MAP AND ENCRYPTION KEY BASED ON INTELLIGENCE SEARCH ALGORITHM IN ENCRYPTION AND STEGANOGRAPHY TO DATA PROTECTION

Journal: International Journal of Mechanical Engineering and Technology(IJMET) (Vol.10, No. 1)

Publication Date:

Authors : ;

Page : 8-24

Keywords : Least Significant Bit (LSB); Stream Cipher Method; Particle Swarm Optimization method; Steganography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the digital world, data is that the heart of computer communication and world economy to make sure the safety for this data it is desired secure transmission of confidential data that gets an excellent deal of attention. Therefore; it's necessary to use effective methods to reinforce information security. Many strategies are coming up to shield the information from going to unauthorized person. Steganography and cryptography are 2 completely different mechanisms for information security. The main purpose in cryptography is to create message idea unintelligible, whereas steganography aims to hide secret message. Digital-pictures are wonderful carriers of hidden information. Combining these two methods is a topic of high relevance since secure communication is inevitable for mankind. In this paper, a method for protection data was proposed comprises a hybridization between cryptography and steganography. In the proposed approach particle swarm optimization algorithm (PSO) was used in both methods(encryption and steganography).The PSO algorithm was used in key generation process for data encryption and in generating hidden locations for data hiding. Also, the Least Significant Bit (LSB)was utilized to add the encrypted data into LSB of the cover and the PSO was utilized to specify the location of hiding data. The data will be encrypted by using stream cipher method. The image will be transmitted and received through the internet and the extraction process would be exactly reveres for hidden process. Experimental results illustrate that the visual, and therefore applying mathematics values of the image with encrypted information before the insertion represented as the same as the values after the insertion so that the reduction in the possibility of the confidential-message to be detected and allows secret communication

Last modified: 2019-05-23 19:59:13