Steganographic manipulations with elliptic curve cryptography

  • Authors:
  • T. N. Shankar;G. Sahoo;S. Niranjan

  • Affiliations:
  • Department of Computer Science and Engineering, GMR Institute of Technology, Rajam-532127, Srikakulam, AP, India.;Department of Information Technology, Birla Institute of Technology, Mesra-835215, Ranchi, Jharkhand, India.;Department of Computer Science and Engineering, Prabhu Dayal Memorial College of Engineering, Bahadurgarh-124507, Jhajjar, Haryana, India.

  • Venue:
  • International Journal of Electronic Security and Digital Forensics
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Steganography is a technique of hiding the existence of information in some other data evincing no trace of data alteration. The term has its origin from Greek that literally means 'covered writing'. Unlike cryptography, which simply conceals the content or meaning of a message, steganography conceals the very existence of a message. In computer-based steganography, several forms of digital media are used as 'cover' for hidden information. Images, documents, web pages, and even MP3 music files may all serve as innocuous-looking hosts for secret messages. In cases of covert communications through internet, digital images due to their ability to carry hidden messages are possibly the most practical type of steganographic methodologies. Most of the steganography-based techniques are within the domain of private key encryption algorithms with the less security level rather than using public key algorithms. An attempt to create the secret code for image steganography for multimedia messaging service or MMS using elliptic curve cryptography has been demonstrated.