Advances in Computer Science and Information Technology. Computer Science and Information Technology. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III

Research Article

An Authenticated BSS Methodology for Data Security Using Steganography

Download
202 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27317-9_43,
        author={B. Ravi Kumar and P. Murti and B. Hemanth Kumar},
        title={An Authenticated BSS Methodology for Data Security Using Steganography},
        proceedings={Advances in Computer Science and Information Technology. Computer Science and Information Technology. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III},
        proceedings_a={CCSIT PART  III},
        year={2012},
        month={11},
        keywords={Bit Shifting Steganography Security Authentication},
        doi={10.1007/978-3-642-27317-9_43}
    }
    
  • B. Ravi Kumar
    P. Murti
    B. Hemanth Kumar
    Year: 2012
    An Authenticated BSS Methodology for Data Security Using Steganography
    CCSIT PART III
    Springer
    DOI: 10.1007/978-3-642-27317-9_43
B. Ravi Kumar1,*, P. Murti1,*, B. Hemanth Kumar2,*
  • 1: University of Hyderabad, P.O. Central University
  • 2: R.V.R.& J.C. College of Engineering
*Contact email: ravi_budithi@yahoo.com, murti.poolla@gmail.com, bhkumar_2000@yahoo.com

Abstract

Within the past several years, there has been an exponential increase in the research community and industry’s focus towards information hiding techniques as opposed to the traditional cryptography area. The goal of Steganography is to conceal information, in plain sight. Providing security to the data means the third party cannot interpret the actual information. When providing authentication to the data then only authorized persons can interpret the data. This system deals with secure transmission of data. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. To provide authentication a four bit dynamic key is generated for every four characters of the encrypted data and the key is also maintained in the data itself. In this system we implement security using steganography. i.e. hiding large amount of information in an image without disturbing the image clarity and its pixels.