SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Rupak Bhattacharyya et al. (Eds) : ACER 2013,
pp. 149–157, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3214
A NUMERICAL METHOD BASED ENCRYPTION
ALGORITHM WITH STEGANOGRAPHY
Amartya Ghosh and Anirban Saha
Regent Education & Research Foundation, Barrackpore, West Bengal, India.
com.amartya@gmail.com and maths.anirban@gmail.com
ABSTRACT
Now-a-days many encryption algorithms have been proposed for network security. In this
paper, a new cryptographic algorithm for network security is proposed to assist the
effectiveness of network security. Here symmetric key concept instead of public key is
considered to develop the encryption – decryption algorithm. Also, to give more security in the
algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to
the proposed work as well as Digital Signature Standard (DSS) technology is used to send the
key. Moreover, steganography is used to hide the cipher within a picture in encryption
algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is
developed using steganography to enhance the network security.
KEYWORDS
Encryption, Decryption, Cryptography, Numerical Method, Steganography.
1. INTRODUCTION
At the present time sending messages in hidden form plays a vital role in Network Security.
Cryptography is the study of mathematical techniques related to aspects of information security
such as confidentiality, data integrity, entity authentication, and data origin authentication.
Actually, it is the study of methods of sending messages in hidden form so that only intended
recipients can remove the disguise and read the message. Cryptography [1, 2] is not the only
means of providing information security, but rather one set of techniques. Cryptography offers
efficient solution to protect sensitive information in a large number of applications including
personal data security, internet security, diplomatic and military communications security, etc.
through the processes of encryption/decryption. It is traditionally the study of means of
converting information from its normal, comprehensible form into an incomprehensible format,
rendering it unreadable without secret knowledge-the art of encryption. Another technique to hide
or secure data is Steganography. There are several ways to hide data using this technique like
steganography in image, steganography in video, steganography in audio, steganography in
document etc.
A cryptosystem is a set of algorithm, indexed by key(s), for encoding messages into cipher text
and decoding them back into plaintext [3]. The model for a secret key system is first proposed by
Shannon [4]. The original information, which is to be protected by cryptography, is called
plaintext. Encryption is the process of converting plaintext into an unreadable form termed cipher
text, or occasionally, a cryptogram. Decryption is the reverse process, recovering the plaintext
back from a cipher text.
150 Computer Science & Information Technology (CS & IT)
Cryptographic algorithms are categorized based on the number of keys that are employed for
encryption and decryption, and further defined by their application and use. The two types of
algorithms are Secret Key Cryptography or Symmetric Key Cryptography (SKC) and Public Key
Cryptography or Asymmetric Key Cryptography (PKC). In case of Symmetric Key
Cryptography, encrypt key and decrypt key are symmetric and the examples of this kind of
algorithm are DES, AES etc. Also, in case of Asymmetric Key Cryptography, encrypt key and
decrypt key are not same and the examples of this kind of algorithm are RSA, McEliece etc.
Figure 1: Basic Idea of Cryptography
Till now, many encryption – decryption algorithms [5, 6] based on symmetric key and
asymmetric key have been proposed. Algorithms on Symmetric Key Cryptography are the most
commonly used cryptography type before invention of public key encryption. One application of
the symmetric key or the private key cryptography is DES (Data Encryption Standard) which is
widely used in the system. Also, due to a number of drawbacks in the encryption – decryption
algorithms on asymmetric key like RSA etc., encryption – decryption algorithms on symmetric
key are very much popular in the Network Security System. In this paper, a numerical method
based secret key encryption – decryption algorithm is developed using steganography. The idea of
one way function [7] alongwith Newton’s Method [8] is applied as a secret (symmetric) key and
Digital Signature Standard (DSS) technology is used to send the key. Also, steganography is used
to hide the cipher within a picture in encryption algorithm. Finally, the proposed encryption –
decryption algorithm is discussed with a suitable conclusion.
The construction of the paper is as follows. In section 2, some prerequisite topics viz. Symmetric
Key Cryptography, Steganography, DSS Technology, One-Way Function and Newton’s Method
are discussed. Then, in section 3, the proposed work along with the explanation of Algorithm is
discussed. Finally, in section 4, some conclusions are specified.
2. PREREQUISITE TOPIC
Here, in this section, some prerequisite subject matters and mathematics are discussed and
actually these topics are used to develop the paper.
2.1. Secret Key Cryptography or Symmetric Key Cryptography (SKC)
There are several ways of classifying cryptographic algorithms. These are categorized based on
the number of keys that are employed for encryption and decryption, and further defined by
application and use. Symmetric Key Cryptography (SKC) is one of these important parts.
Computer Science & Information Technology (CS & IT) 151
Figure 2: Symmetric Key Cryptography
Symmetric cryptography is also referred to as conventional encryption or single key encryption.
In symmetric cryptography the same key is used for both encryption and decryption. This
technique can encrypt data, either locally by a single user to safeguard his/her files, or to be
exchanged between users. If encrypted data is exchanged between two (or more) users, each
must know the key to be used. Obviously, this key should be exchanged in a secure manner.
Symmetric cryptography is commonly used to perform encryption. It also provides data integrity
when symmetric keys are used in conjunction with other algorithms.
Figure 3: Symmetric Key Technique
2.2. Steganography
Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out of the usual. Steganography is often confused with cryptology because
these two are similar in the way that they both are used to protect important information. The
difference between the two is that steganography involves hiding information so it appears that no
information is hidden at all. If a person views the object in which the information is hidden and he
or she have no idea that there is any hidden information, then the person will not attempt to
decrypt the information. Steganography in the modern day sense usually refers to information or a
file that has been concealed inside a digital Picture, Video or Audio file.
Steganography and encryption are both used to ensure data confidentiality. However the main
difference between them is that with encryption anybody can see that both parties are
communicating in secret. Steganography hides the existence of a secret message and in the best
case nobody can see that both parties are communicating in secret. This makes steganography
suitable for some tasks such as copyright marking. Adding encrypted copyright information to a
file could be easy to remove but embedding it within the contents of the file itself can prevent it
being easily identified and removed. Encryption allows secure communication requiring a key to
read the information. Steganography provides a means of secret communication which cannot be
removed without significantly altering the data in which it is embedded. The embedded data will
be confidential unless an attacker can find a way to detect it. There are numerous methods used to
hide information inside of Picture, Audio and Video files.
152 Computer Science & Information Technology (CS & IT)
When hiding information inside images the LSB (Least Significant Byte) method is usually used.
To a computer an image file is simply a file that shows different colors and intensities of light on
different areas of an image. The best type of image file to hide information inside of is a 24 Bit
BMP (Bitmap) image. The reason being this is the largest type of file and normally it is of the
highest quality. When an image is of high quality and resolution, then it is a lot easier to hide and
mask information inside of. Although 24 Bit images are best for hiding information inside of due
to their size, some people may choose to use 8 Bit BMP’s or possibly another image format such
as GIF, the reason being is that posting of large images on the internet may arouse suspicion. It is
important to remember that if you hide information inside of an image file and that file is
converted to another image format, it is most likely the hidden information inside will be lost.
The art of detecting steganography is referred to as steganalysis. To put it simply steganalysis
involves detecting the use of steganography inside of a file. Steganalysis does not deal with trying
to decrypt the hidden information inside of a file, just discovering it. To detect steganography
viewing the file and comparing it to another copy of the file found on the internet (Picture File).
There are usually multiple copies of images on the internet, so you may want to look for several
of them and try and compare the suspect file to them. For example if you download a JPEG and
your suspect file is also a JPEG and the two files look almost identical apart from the fact that one
is larger than the other, it is most probable your suspect file has hidden information inside of it.
2.3. Digital Signature Standard (DSS) Technology
A digital signature is an electronic analogue of a written signature. The digital signature can be
used to provide assurance that the claimed signatory signed the information. In addition, a digital
signature may be used to detect whether or not the information was modified after it was signed
(i.e., to detect the integrity of the signed data). These assurances may be obtained whether the
data was received in a transmission or retrieved from storage. A properly implemented digital
signature algorithm that meets the requirements of this standard can provide these services.
2.4. One-Way Function
In computer science, a one-way function is a function that is easy to compute on every input, but
hard to invert given the image of a random input. Here "easy" and "hard" are to be understood in
the sense of computational complexity theory, specifically the theory of polynomial time
problems. The existence of such one-way functions is still an open conjecture.
In applied contexts, the terms "easy" and "hard" are usually interpreted relative to some specific
computing entity; typically "cheap enough for the legitimate users" and "prohibitively expensive
for any malicious agents". One-way functions, in this sense, are fundamental tools for
cryptography, personal identification, authentication, and other data security applications. While
the existence of such functions too is an open conjecture, there are several candidates that have
withstood decades of intense scrutiny. Some of them are essential ingredients of most
telecommunications, e-commerce, and e-banking systems around the world.
This function must be "hard to invert" in the average-case. Note also that just making a function
"lossy" (not one-to-one) does not make it a one-way function. In this context, inverting a function
means identifying some pre-image element of a given value, which does not require the existence
of an inverse function. For example, f(x) = x2
is not invertible (for example f (2) = f (-2) = 4) but is
also not one-way, since given any value, you can compute one of its pre-image elements in
polynomial time by taking its square root.
If f is a one-way function, then the inversion of f would be a problem whose output is hard to
compute (by definition) but easy to check (just by computing f on it). There is an explicit function
which has been demonstrated to be one-way if and only if one-way functions exist. Since this
Computer Science & Information Technology (CS & IT) 153
function was the first combinatorial complete one-way function to be demonstrated, it is known
as the "universal one-way function". The problem of determining the existence of one-way
functions is thus reduced to the problem of proving that this specific function is one-way.
2.5. Newton’s Method
In numerical analysis, Newton's method (also known as the Newton–Raphson method), named
after Isaac Newton and Joseph Raphson, is perhaps the best known method for finding
successively better approximations to the zeroes (or roots) of a real-valued function. Newton's
method can often converge remarkably quickly; especially if the iteration begins "sufficiently
near" the desired root. Just how near "sufficiently near" needs to be, and just how quickly
"remarkably quickly" can be, depends on the problem. This is discussed in detail below.
Unfortunately, when iteration begins far from the desired root, Newton's method can easily lead
an unwary user astray with little warning. Thus, good implementations of the method embed it in
a routine that also detects and perhaps overcomes possible convergence failures.
Given a function ( )f x and its derivative ( )f x′ , we begin with a first guess 0x . Provided the
function is reasonably well-behaved a better approximation 1x is 0
1 0
0
( )
( )
f x
x x
f x
= −
′
. The process
is repeated until a sufficiently accurate value is reached i.e. 1
( )
( )
n
n n
n
f x
x x
f x
+ = −
′
.
The idea of the method is as follows: one starts with an initial guess which is reasonably close to
the true root, then the function is approximated by its tangent line (which can be computed using
the tools of calculus), and one computes the x-intercept of this tangent line (which is easily done
with elementary algebra). This x-intercept will typically be a better approximation to the
function's root than the original guess, and the method can be iterated.
Suppose ƒ: [a, b] → R is a differentiable function defined on the interval [a, b] with values in the
real numbers R. The formula for converging on the root can be easily derived. Suppose we have
some current approximation xn. Then we can derive the formula for a better approximation, xn+1.
We know from the definition of the derivative at a given point that it is the slope of a tangent at
that point.
So,
1
1
( ) 0
( ) lim
n n
n
n
x x
n n
f xrise
f x
run x x+→
+
 −
′ = =  
− 
, where, f ′ denotes the derivative of the function f.
Then by simple algebra we can derive 1
( )
( )
n
n n
n
f x
x x
f x
+ = −
′
• Example for Square root of a number: Consider the problem of finding the square root
of a number. For example, if one wishes to find the square root of 612, this is equivalent to
finding the solution for 2
612x = . The function to use in Newton's method is then
2
( ) 612f x x= − with derivative ( ) 2f x x′ = . With an initial guess of 10, the sequence given by
Newton's method is
154 Computer Science & Information Technology (CS & IT)
2
0
1 0
0
2
1
2 1
1
2
3 2
2
3
4 3
3
( ) 10 612
10 35.6
( ) 2 10
( ) 35.6 612
35.6 26.3955056
( ) 2 35.6
( )
............................. 2 4.7 906355
( )
( )
............................. 2 4.7 3 8 6 8
( )
f x
x x
f x
f x
x x
f x
f x
x x
f x
f x
x x
f x
−
= − = − =
′ ×
−
= − = − =
′ ×
= − = =
′
= − = =
′
4
5 4
4
83
( )
............................. 2 4 .7 3 8 6 3 3 8
( )
f x
x x
f x
= − = =
′
Where the correct digits are underlined. With only a few iterations one can obtain a solution
accurate to many decimal places.
• Example for solution of a non-polynomial equation: Consider the problem of finding
the positive number x with 3
cos x x= . We can rephrase that as finding the zero
of 3
( ) cosf x x x= − . We have 2
( ) sin 3f x x x′ = − − . Since cos 1x ≤ for all x, we know that
solution lies between 0 and 1. We try a starting value of x0 = 0.5. (Note that a starting value of 0
will lead to an undefined result, showing the importance of using a starting point that is close to
the zero).
( ) ( )
( ) ( )
3
0
1 0 2
0
1
2 1
1
2
3 2
2
cos 0.5 0.5( )
0.5 1.112141637097
( ) sin 0.5 3 0.5
( )
........................................ 0.909672693736
( )
( )
....................................... 0.8 67263
( )
f x
x x
f x
f x
x x
f x
f x
x x
f x
−
= − = − =
′ − −
= − = =
′
= − = =
′
3
4 3
3
4
5 4
4
5
6 5
5
818209
( )
....................................... 0.8 6 5477135298
( )
( )
....................................... 0.8 6 54740 3 3 1 11
( )
( )
................................
( )
f x
x x
f x
f x
x x
f x
f x
x x
f x
= − = =
′
= − = =
′
= − =
′
....... 0.8 6 5 4740 3 3 1 02=
The correct digits are underlined in the above example. In particular, x6 is correct to the number
of decimal places given. We see that the number of correct digits after the decimal point increases
from 2 (for x3) to 5 and 10, illustrating the quadratic convergence.
Computer Science & Information Technology (CS & IT) 155
3. PROPOSED WORK
In this section, the overall proposed work on numerical method based Encryption – Decryption
Algorithm along with Steganography is discussed.
3.1. Proposed Algorithm
The Proposed Algorithms for Encryption and Decryption are given below:
• Algorithm for Encryption:
Step–1: Read the characters from a text file and get the ASCII values
for different characters.
Step–2: Take a Polynomial function from Receiver using DSS Technology
and subtract the ASCII values from the Polynomial and equating
with zero to get the polynomial equations.
Step–3: Solve the Polynomial Equations and put the solutions into an array.
Step–4: Put the array into a BMP file.
Step–5: Put some Garbage pixels into the BMP file.
• Algorithm for Decryption:
Step–1: Read the BMP file and isolates the actual pixels from Garbage pixels.
Step–2: Take the values from the pixels and store into an array.
Step–3: Put the values into the Polynomial function and get the functional values.
Step–4: Convert the functional values into characters and put into a text file.
3.2. Encryption Process (Sender Side)
1) Create a Text File: First of all we write a text message into a text file. Now using file pointer
we read the characters and store the ASCII value of these characters.
2) Send the Request to the Receiver and get the One Way Function: Now send a request to
the Receiver to give the One Way Function. Receiver will send the function using Digital
Signature Standards (DSS). After receiving the function check the authentication of that file
which is contained with the function. Receiver will send the function in a BMP file. Suppose the
function is 3
( ) 3.5 2.7 17f x x x= − − .
Figure – 4: Secret Key
156 Computer Science & Information Technology (CS & IT)
3) Form the Equation using Function and Solve the Equation: Now for each ASCII value
create an equation like ( )f x – ASCII Value = 0. Solve the equation and get the value of x. For
the ASCII value of each character we get a solution and store it into memory. For example,
ASCII value of M is 77 so that the equation will be ( ) 77 0f x − = . After solving the equation,
the solution is 3.0805x = . Similarly, solutions for other characters are also stored into memory.
4) Create the .BMP File: Now the solution is a Floating Point Number, which is required 4 bytes
or 32 bits in the memory. Now split every 32 bit into four 8 bits. Each 8 bits will be printed as a
pixel in a BMP file.
5) Put Garbage Pixels: Using some kind of sequence or a series, put some garbage pixel to make
the encryption process more secure.
Figure 5: Encryption Process
3.3. Decryption Process (Receiver Side)
1) Read the .BMP File and isolate the original pixels: First of all read the BMP file and isolate
the original pixels from the garbage pixels. From value of continuous four pixels we can get the
each solution, which is a floating point number.
2) Calculate the Functional Values to get the ASCII Values of the Characters: Now put the
solutions into the function and calculate the functional values. For example, f (3.0805) =
76.99585. Now rounding the result we can get 77, which is the ASCII value of ‘M’. Finally write
the character into a text file and then finding the other characters by similar way one can read and
understand the total message.
Figure – 6: Decryption Process
Computer Science & Information Technology (CS & IT) 157
4. CONCLUSION
In this paper a new approach is proposed to secure the network by combination of cryptography
and steganography. The proposed algorithm is very simple in nature, more secure and less
complex and this algorithm is more useful for any kind of computer configuration. Here, a secret
key conception is introduced taking the idea of one way function alongwith Newton’s Method.
Finally, a numerical method based secret key encryption – decryption algorithm is developed
using steganography to enhance the Network Security System.
REFERENCES
[1] Stallings, W., (2002) “Cryptography & Network Security: Principals and Practice”, 3rd Edition,
Prentice Hall.
[2] Menzes, A. J., Paul, C., Van Dorschot, V., Vanstone, S. A., (2001) “Handbook of Applied
Cryptography”, CRS Press 5th Printing.
[3] Koblitz, N., (1994) “A Course in Number Theory and Cryptography”, Springer-Verlag, New York,
Inc.
[4] Shannon, C. E., (1949) “Communication Theory of Security System”, Bell System Technical Journal,
Vol. 28, No. 4, pp. 656 – 715.
[5] Ayushi, (2010) “A Symmetric Key Cryptographic Algorithm”, International Journal of Computer
Applications, Vol. 1, No. 15, pp. 0975 – 8887.
[6] Booth, Kellogg S., (1981) “Authentication of signatures using public key encryption”,
Communications of the ACM, pp. 772 – 774.
[7] Levin, Leonid A., (2003) “The Tale of One-way Functions”, Problems of Information Transmission,
Vol. 39, No. 1, pp. 92 – 103.
[8] Mollah, S. A., (2000) “Numerical Analysis and Computational Procedures”, Books & Allied (P) Ltd.
Kolkata.
AUTHORS
Amartya Ghosh received his B.Tech. and M.Tech. degrees in Information Technology
and Computer Science Engineering respectively from JIS College of Engineering,
Kalyani, West Bengal, India. He is currently an Assistant Professor at Regent Education
& Research Foundation. His research interests include Cryptography, Financial
Management and Soft Computing Technique.
Anirban Saha received his B.Sc. and M.Sc. degrees in Mathematics from the Dept. of
Mathematics, University of Kalyani, West Bengal, India. Also he did his B.Ed. degree
from the Dept of Education, University of Kalyani. He is currently an Assistant Professor
(Senior Grade) at Regent Education & Research Foundation and pursuing Ph.D. degree
in Mathematics at National Institute of Technology, Durgapur, India. He has some
research publications in different reputed International and National Journals and
Conferences. His research interests include Operations Research & Optimization,
Financial Management and Soft Computing Technique.

Weitere ähnliche Inhalte

Was ist angesagt?

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsMaddiSujitha
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 

Was ist angesagt? (18)

H41034449
H41034449H41034449
H41034449
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
319 325
319 325319 325
319 325
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Steganography
SteganographySteganography
Steganography
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 

Ähnlich wie Numerical Method Encryption Algorithm with Steganography

A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
About Steganography
About SteganographyAbout Steganography
About SteganographySudhansh Gupta
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkStephen Hasford
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visualsijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
 

Ähnlich wie Numerical Method Encryption Algorithm with Steganography (20)

A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
N45028390
N45028390N45028390
N45028390
 
H017255560
H017255560H017255560
H017255560
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 

Mehr von cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

Mehr von cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

KĂźrzlich hochgeladen

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

KĂźrzlich hochgeladen (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

Numerical Method Encryption Algorithm with Steganography

  • 1. Rupak Bhattacharyya et al. (Eds) : ACER 2013, pp. 149–157, 2013. Š CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3214 A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY Amartya Ghosh and Anirban Saha Regent Education & Research Foundation, Barrackpore, West Bengal, India. com.amartya@gmail.com and maths.anirban@gmail.com ABSTRACT Now-a-days many encryption algorithms have been proposed for network security. In this paper, a new cryptographic algorithm for network security is proposed to assist the effectiveness of network security. Here symmetric key concept instead of public key is considered to develop the encryption – decryption algorithm. Also, to give more security in the algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to the proposed work as well as Digital Signature Standard (DSS) technology is used to send the key. Moreover, steganography is used to hide the cipher within a picture in encryption algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is developed using steganography to enhance the network security. KEYWORDS Encryption, Decryption, Cryptography, Numerical Method, Steganography. 1. INTRODUCTION At the present time sending messages in hidden form plays a vital role in Network Security. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Actually, it is the study of methods of sending messages in hidden form so that only intended recipients can remove the disguise and read the message. Cryptography [1, 2] is not the only means of providing information security, but rather one set of techniques. Cryptography offers efficient solution to protect sensitive information in a large number of applications including personal data security, internet security, diplomatic and military communications security, etc. through the processes of encryption/decryption. It is traditionally the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge-the art of encryption. Another technique to hide or secure data is Steganography. There are several ways to hide data using this technique like steganography in image, steganography in video, steganography in audio, steganography in document etc. A cryptosystem is a set of algorithm, indexed by key(s), for encoding messages into cipher text and decoding them back into plaintext [3]. The model for a secret key system is first proposed by Shannon [4]. The original information, which is to be protected by cryptography, is called plaintext. Encryption is the process of converting plaintext into an unreadable form termed cipher text, or occasionally, a cryptogram. Decryption is the reverse process, recovering the plaintext back from a cipher text.
  • 2. 150 Computer Science & Information Technology (CS & IT) Cryptographic algorithms are categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The two types of algorithms are Secret Key Cryptography or Symmetric Key Cryptography (SKC) and Public Key Cryptography or Asymmetric Key Cryptography (PKC). In case of Symmetric Key Cryptography, encrypt key and decrypt key are symmetric and the examples of this kind of algorithm are DES, AES etc. Also, in case of Asymmetric Key Cryptography, encrypt key and decrypt key are not same and the examples of this kind of algorithm are RSA, McEliece etc. Figure 1: Basic Idea of Cryptography Till now, many encryption – decryption algorithms [5, 6] based on symmetric key and asymmetric key have been proposed. Algorithms on Symmetric Key Cryptography are the most commonly used cryptography type before invention of public key encryption. One application of the symmetric key or the private key cryptography is DES (Data Encryption Standard) which is widely used in the system. Also, due to a number of drawbacks in the encryption – decryption algorithms on asymmetric key like RSA etc., encryption – decryption algorithms on symmetric key are very much popular in the Network Security System. In this paper, a numerical method based secret key encryption – decryption algorithm is developed using steganography. The idea of one way function [7] alongwith Newton’s Method [8] is applied as a secret (symmetric) key and Digital Signature Standard (DSS) technology is used to send the key. Also, steganography is used to hide the cipher within a picture in encryption algorithm. Finally, the proposed encryption – decryption algorithm is discussed with a suitable conclusion. The construction of the paper is as follows. In section 2, some prerequisite topics viz. Symmetric Key Cryptography, Steganography, DSS Technology, One-Way Function and Newton’s Method are discussed. Then, in section 3, the proposed work along with the explanation of Algorithm is discussed. Finally, in section 4, some conclusions are specified. 2. PREREQUISITE TOPIC Here, in this section, some prerequisite subject matters and mathematics are discussed and actually these topics are used to develop the paper. 2.1. Secret Key Cryptography or Symmetric Key Cryptography (SKC) There are several ways of classifying cryptographic algorithms. These are categorized based on the number of keys that are employed for encryption and decryption, and further defined by application and use. Symmetric Key Cryptography (SKC) is one of these important parts.
  • 3. Computer Science & Information Technology (CS & IT) 151 Figure 2: Symmetric Key Cryptography Symmetric cryptography is also referred to as conventional encryption or single key encryption. In symmetric cryptography the same key is used for both encryption and decryption. This technique can encrypt data, either locally by a single user to safeguard his/her files, or to be exchanged between users. If encrypted data is exchanged between two (or more) users, each must know the key to be used. Obviously, this key should be exchanged in a secure manner. Symmetric cryptography is commonly used to perform encryption. It also provides data integrity when symmetric keys are used in conjunction with other algorithms. Figure 3: Symmetric Key Technique 2.2. Steganography Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptology because these two are similar in the way that they both are used to protect important information. The difference between the two is that steganography involves hiding information so it appears that no information is hidden at all. If a person views the object in which the information is hidden and he or she have no idea that there is any hidden information, then the person will not attempt to decrypt the information. Steganography in the modern day sense usually refers to information or a file that has been concealed inside a digital Picture, Video or Audio file. Steganography and encryption are both used to ensure data confidentiality. However the main difference between them is that with encryption anybody can see that both parties are communicating in secret. Steganography hides the existence of a secret message and in the best case nobody can see that both parties are communicating in secret. This makes steganography suitable for some tasks such as copyright marking. Adding encrypted copyright information to a file could be easy to remove but embedding it within the contents of the file itself can prevent it being easily identified and removed. Encryption allows secure communication requiring a key to read the information. Steganography provides a means of secret communication which cannot be removed without significantly altering the data in which it is embedded. The embedded data will be confidential unless an attacker can find a way to detect it. There are numerous methods used to hide information inside of Picture, Audio and Video files.
  • 4. 152 Computer Science & Information Technology (CS & IT) When hiding information inside images the LSB (Least Significant Byte) method is usually used. To a computer an image file is simply a file that shows different colors and intensities of light on different areas of an image. The best type of image file to hide information inside of is a 24 Bit BMP (Bitmap) image. The reason being this is the largest type of file and normally it is of the highest quality. When an image is of high quality and resolution, then it is a lot easier to hide and mask information inside of. Although 24 Bit images are best for hiding information inside of due to their size, some people may choose to use 8 Bit BMP’s or possibly another image format such as GIF, the reason being is that posting of large images on the internet may arouse suspicion. It is important to remember that if you hide information inside of an image file and that file is converted to another image format, it is most likely the hidden information inside will be lost. The art of detecting steganography is referred to as steganalysis. To put it simply steganalysis involves detecting the use of steganography inside of a file. Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it. To detect steganography viewing the file and comparing it to another copy of the file found on the internet (Picture File). There are usually multiple copies of images on the internet, so you may want to look for several of them and try and compare the suspect file to them. For example if you download a JPEG and your suspect file is also a JPEG and the two files look almost identical apart from the fact that one is larger than the other, it is most probable your suspect file has hidden information inside of it. 2.3. Digital Signature Standard (DSS) Technology A digital signature is an electronic analogue of a written signature. The digital signature can be used to provide assurance that the claimed signatory signed the information. In addition, a digital signature may be used to detect whether or not the information was modified after it was signed (i.e., to detect the integrity of the signed data). These assurances may be obtained whether the data was received in a transmission or retrieved from storage. A properly implemented digital signature algorithm that meets the requirements of this standard can provide these services. 2.4. One-Way Function In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here "easy" and "hard" are to be understood in the sense of computational complexity theory, specifically the theory of polynomial time problems. The existence of such one-way functions is still an open conjecture. In applied contexts, the terms "easy" and "hard" are usually interpreted relative to some specific computing entity; typically "cheap enough for the legitimate users" and "prohibitively expensive for any malicious agents". One-way functions, in this sense, are fundamental tools for cryptography, personal identification, authentication, and other data security applications. While the existence of such functions too is an open conjecture, there are several candidates that have withstood decades of intense scrutiny. Some of them are essential ingredients of most telecommunications, e-commerce, and e-banking systems around the world. This function must be "hard to invert" in the average-case. Note also that just making a function "lossy" (not one-to-one) does not make it a one-way function. In this context, inverting a function means identifying some pre-image element of a given value, which does not require the existence of an inverse function. For example, f(x) = x2 is not invertible (for example f (2) = f (-2) = 4) but is also not one-way, since given any value, you can compute one of its pre-image elements in polynomial time by taking its square root. If f is a one-way function, then the inversion of f would be a problem whose output is hard to compute (by definition) but easy to check (just by computing f on it). There is an explicit function which has been demonstrated to be one-way if and only if one-way functions exist. Since this
  • 5. Computer Science & Information Technology (CS & IT) 153 function was the first combinatorial complete one-way function to be demonstrated, it is known as the "universal one-way function". The problem of determining the existence of one-way functions is thus reduced to the problem of proving that this specific function is one-way. 2.5. Newton’s Method In numerical analysis, Newton's method (also known as the Newton–Raphson method), named after Isaac Newton and Joseph Raphson, is perhaps the best known method for finding successively better approximations to the zeroes (or roots) of a real-valued function. Newton's method can often converge remarkably quickly; especially if the iteration begins "sufficiently near" the desired root. Just how near "sufficiently near" needs to be, and just how quickly "remarkably quickly" can be, depends on the problem. This is discussed in detail below. Unfortunately, when iteration begins far from the desired root, Newton's method can easily lead an unwary user astray with little warning. Thus, good implementations of the method embed it in a routine that also detects and perhaps overcomes possible convergence failures. Given a function ( )f x and its derivative ( )f x′ , we begin with a first guess 0x . Provided the function is reasonably well-behaved a better approximation 1x is 0 1 0 0 ( ) ( ) f x x x f x = − ′ . The process is repeated until a sufficiently accurate value is reached i.e. 1 ( ) ( ) n n n n f x x x f x + = − ′ . The idea of the method is as follows: one starts with an initial guess which is reasonably close to the true root, then the function is approximated by its tangent line (which can be computed using the tools of calculus), and one computes the x-intercept of this tangent line (which is easily done with elementary algebra). This x-intercept will typically be a better approximation to the function's root than the original guess, and the method can be iterated. Suppose ƒ: [a, b] → R is a differentiable function defined on the interval [a, b] with values in the real numbers R. The formula for converging on the root can be easily derived. Suppose we have some current approximation xn. Then we can derive the formula for a better approximation, xn+1. We know from the definition of the derivative at a given point that it is the slope of a tangent at that point. So, 1 1 ( ) 0 ( ) lim n n n n x x n n f xrise f x run x x+→ +  − ′ = =   −  , where, f ′ denotes the derivative of the function f. Then by simple algebra we can derive 1 ( ) ( ) n n n n f x x x f x + = − ′ • Example for Square root of a number: Consider the problem of finding the square root of a number. For example, if one wishes to find the square root of 612, this is equivalent to finding the solution for 2 612x = . The function to use in Newton's method is then 2 ( ) 612f x x= − with derivative ( ) 2f x x′ = . With an initial guess of 10, the sequence given by Newton's method is
  • 6. 154 Computer Science & Information Technology (CS & IT) 2 0 1 0 0 2 1 2 1 1 2 3 2 2 3 4 3 3 ( ) 10 612 10 35.6 ( ) 2 10 ( ) 35.6 612 35.6 26.3955056 ( ) 2 35.6 ( ) ............................. 2 4.7 906355 ( ) ( ) ............................. 2 4.7 3 8 6 8 ( ) f x x x f x f x x x f x f x x x f x f x x x f x − = − = − = ′ × − = − = − = ′ × = − = = ′ = − = = ′ 4 5 4 4 83 ( ) ............................. 2 4 .7 3 8 6 3 3 8 ( ) f x x x f x = − = = ′ Where the correct digits are underlined. With only a few iterations one can obtain a solution accurate to many decimal places. • Example for solution of a non-polynomial equation: Consider the problem of finding the positive number x with 3 cos x x= . We can rephrase that as finding the zero of 3 ( ) cosf x x x= − . We have 2 ( ) sin 3f x x x′ = − − . Since cos 1x ≤ for all x, we know that solution lies between 0 and 1. We try a starting value of x0 = 0.5. (Note that a starting value of 0 will lead to an undefined result, showing the importance of using a starting point that is close to the zero). ( ) ( ) ( ) ( ) 3 0 1 0 2 0 1 2 1 1 2 3 2 2 cos 0.5 0.5( ) 0.5 1.112141637097 ( ) sin 0.5 3 0.5 ( ) ........................................ 0.909672693736 ( ) ( ) ....................................... 0.8 67263 ( ) f x x x f x f x x x f x f x x x f x − = − = − = ′ − − = − = = ′ = − = = ′ 3 4 3 3 4 5 4 4 5 6 5 5 818209 ( ) ....................................... 0.8 6 5477135298 ( ) ( ) ....................................... 0.8 6 54740 3 3 1 11 ( ) ( ) ................................ ( ) f x x x f x f x x x f x f x x x f x = − = = ′ = − = = ′ = − = ′ ....... 0.8 6 5 4740 3 3 1 02= The correct digits are underlined in the above example. In particular, x6 is correct to the number of decimal places given. We see that the number of correct digits after the decimal point increases from 2 (for x3) to 5 and 10, illustrating the quadratic convergence.
  • 7. Computer Science & Information Technology (CS & IT) 155 3. PROPOSED WORK In this section, the overall proposed work on numerical method based Encryption – Decryption Algorithm along with Steganography is discussed. 3.1. Proposed Algorithm The Proposed Algorithms for Encryption and Decryption are given below: • Algorithm for Encryption: Step–1: Read the characters from a text file and get the ASCII values for different characters. Step–2: Take a Polynomial function from Receiver using DSS Technology and subtract the ASCII values from the Polynomial and equating with zero to get the polynomial equations. Step–3: Solve the Polynomial Equations and put the solutions into an array. Step–4: Put the array into a BMP file. Step–5: Put some Garbage pixels into the BMP file. • Algorithm for Decryption: Step–1: Read the BMP file and isolates the actual pixels from Garbage pixels. Step–2: Take the values from the pixels and store into an array. Step–3: Put the values into the Polynomial function and get the functional values. Step–4: Convert the functional values into characters and put into a text file. 3.2. Encryption Process (Sender Side) 1) Create a Text File: First of all we write a text message into a text file. Now using file pointer we read the characters and store the ASCII value of these characters. 2) Send the Request to the Receiver and get the One Way Function: Now send a request to the Receiver to give the One Way Function. Receiver will send the function using Digital Signature Standards (DSS). After receiving the function check the authentication of that file which is contained with the function. Receiver will send the function in a BMP file. Suppose the function is 3 ( ) 3.5 2.7 17f x x x= − − . Figure – 4: Secret Key
  • 8. 156 Computer Science & Information Technology (CS & IT) 3) Form the Equation using Function and Solve the Equation: Now for each ASCII value create an equation like ( )f x – ASCII Value = 0. Solve the equation and get the value of x. For the ASCII value of each character we get a solution and store it into memory. For example, ASCII value of M is 77 so that the equation will be ( ) 77 0f x − = . After solving the equation, the solution is 3.0805x = . Similarly, solutions for other characters are also stored into memory. 4) Create the .BMP File: Now the solution is a Floating Point Number, which is required 4 bytes or 32 bits in the memory. Now split every 32 bit into four 8 bits. Each 8 bits will be printed as a pixel in a BMP file. 5) Put Garbage Pixels: Using some kind of sequence or a series, put some garbage pixel to make the encryption process more secure. Figure 5: Encryption Process 3.3. Decryption Process (Receiver Side) 1) Read the .BMP File and isolate the original pixels: First of all read the BMP file and isolate the original pixels from the garbage pixels. From value of continuous four pixels we can get the each solution, which is a floating point number. 2) Calculate the Functional Values to get the ASCII Values of the Characters: Now put the solutions into the function and calculate the functional values. For example, f (3.0805) = 76.99585. Now rounding the result we can get 77, which is the ASCII value of ‘M’. Finally write the character into a text file and then finding the other characters by similar way one can read and understand the total message. Figure – 6: Decryption Process
  • 9. Computer Science & Information Technology (CS & IT) 157 4. CONCLUSION In this paper a new approach is proposed to secure the network by combination of cryptography and steganography. The proposed algorithm is very simple in nature, more secure and less complex and this algorithm is more useful for any kind of computer configuration. Here, a secret key conception is introduced taking the idea of one way function alongwith Newton’s Method. Finally, a numerical method based secret key encryption – decryption algorithm is developed using steganography to enhance the Network Security System. REFERENCES [1] Stallings, W., (2002) “Cryptography & Network Security: Principals and Practice”, 3rd Edition, Prentice Hall. [2] Menzes, A. J., Paul, C., Van Dorschot, V., Vanstone, S. A., (2001) “Handbook of Applied Cryptography”, CRS Press 5th Printing. [3] Koblitz, N., (1994) “A Course in Number Theory and Cryptography”, Springer-Verlag, New York, Inc. [4] Shannon, C. E., (1949) “Communication Theory of Security System”, Bell System Technical Journal, Vol. 28, No. 4, pp. 656 – 715. [5] Ayushi, (2010) “A Symmetric Key Cryptographic Algorithm”, International Journal of Computer Applications, Vol. 1, No. 15, pp. 0975 – 8887. [6] Booth, Kellogg S., (1981) “Authentication of signatures using public key encryption”, Communications of the ACM, pp. 772 – 774. [7] Levin, Leonid A., (2003) “The Tale of One-way Functions”, Problems of Information Transmission, Vol. 39, No. 1, pp. 92 – 103. [8] Mollah, S. A., (2000) “Numerical Analysis and Computational Procedures”, Books & Allied (P) Ltd. Kolkata. AUTHORS Amartya Ghosh received his B.Tech. and M.Tech. degrees in Information Technology and Computer Science Engineering respectively from JIS College of Engineering, Kalyani, West Bengal, India. He is currently an Assistant Professor at Regent Education & Research Foundation. His research interests include Cryptography, Financial Management and Soft Computing Technique. Anirban Saha received his B.Sc. and M.Sc. degrees in Mathematics from the Dept. of Mathematics, University of Kalyani, West Bengal, India. Also he did his B.Ed. degree from the Dept of Education, University of Kalyani. He is currently an Assistant Professor (Senior Grade) at Regent Education & Research Foundation and pursuing Ph.D. degree in Mathematics at National Institute of Technology, Durgapur, India. He has some research publications in different reputed International and National Journals and Conferences. His research interests include Operations Research & Optimization, Financial Management and Soft Computing Technique.