Research Article
An Authenticated BSS Methodology for Data Security Using Steganography
@INPROCEEDINGS{10.1007/978-3-642-27317-9_43, author={B. Ravi Kumar and P. Murti and B. Hemanth Kumar}, title={An Authenticated BSS Methodology for Data Security Using Steganography}, proceedings={Advances in Computer Science and Information Technology. Computer Science and Information Technology. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III}, proceedings_a={CCSIT PART III}, year={2012}, month={11}, keywords={Bit Shifting Steganography Security Authentication}, doi={10.1007/978-3-642-27317-9_43} }
- B. Ravi Kumar
P. Murti
B. Hemanth Kumar
Year: 2012
An Authenticated BSS Methodology for Data Security Using Steganography
CCSIT PART III
Springer
DOI: 10.1007/978-3-642-27317-9_43
Abstract
Within the past several years, there has been an exponential increase in the research community and industry’s focus towards information hiding techniques as opposed to the traditional cryptography area. The goal of Steganography is to conceal information, in plain sight. Providing security to the data means the third party cannot interpret the actual information. When providing authentication to the data then only authorized persons can interpret the data. This system deals with secure transmission of data. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. To provide authentication a four bit dynamic key is generated for every four characters of the encrypted data and the key is also maintained in the data itself. In this system we implement security using steganography. i.e. hiding large amount of information in an image without disturbing the image clarity and its pixels.