Decrypted secrets: methods and maxims of cryptology
Decrypted secrets: methods and maxims of cryptology
Encryption wars: shifting tactics
IEEE Spectrum
On the limits of steganography
IEEE Journal on Selected Areas in Communications
The decoy: multi-level digital multimedia steganography model
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Hi-index | 0.00 |
In this paper, we have proposed a cryptosystem using state of the art technology. We used the minimum possible compressed speech file for encryption. Additionally we applied data compression to speech files and added further compression. Then we applied data encryption techniques to minimize security threats. We applied the symmetric and asymmetric encryption algorithms to the compressed speech files. This was followed by hiding these files into cover images using steganography. This camouflages the secret data and reduces chances of eavesdropping. By using compression, the capacity has been increased. However, after applying encryption, the size of the encrypted data becomes much greater than the input file size, therefore hiding it in a cover demands more capacity. We have analyzed the size of the cipher texts of the compressed speech data for further enhancement of the capacity.