Author(s): G. Manikandan | N. Sairam | M. Kamarasan
Journal: Research Journal of Applied Sciences, Engineering and Technology
ISSN 2040-7459
Volume: 4;
Issue: 6;
Start page: 608;
Date: 2012;
Original page
Keywords: Blowfish | cryptography | f-function | lossless compression | security | steganography
ABSTRACT
In this study we propose a new hybrid technique of combining “the twins” cryptography, Steganography along with the compression techniques which results in a new extreme of providing informational security. The importance of information not only depends upon its contents but also upon its safety arrival to the receiver. Nowadays, eavesdropping one’s personal messages and exposing it to the air becomes passion of showing one’s technical expertise to the world. There are numerous occurrences of breaching of message contents even where the data equipped with the techniques of Steganography and cryptography. So, a need for “practically unbreakable and non suspicious systems” becomes vital. Our experimental results shows that our system is unique in its design and as well as in its performance when compared to a specific steganographic or a cryptographic technique.
Journal: Research Journal of Applied Sciences, Engineering and Technology
ISSN 2040-7459
Volume: 4;
Issue: 6;
Start page: 608;
Date: 2012;
Original page
Keywords: Blowfish | cryptography | f-function | lossless compression | security | steganography
ABSTRACT
In this study we propose a new hybrid technique of combining “the twins” cryptography, Steganography along with the compression techniques which results in a new extreme of providing informational security. The importance of information not only depends upon its contents but also upon its safety arrival to the receiver. Nowadays, eavesdropping one’s personal messages and exposing it to the air becomes passion of showing one’s technical expertise to the world. There are numerous occurrences of breaching of message contents even where the data equipped with the techniques of Steganography and cryptography. So, a need for “practically unbreakable and non suspicious systems” becomes vital. Our experimental results shows that our system is unique in its design and as well as in its performance when compared to a specific steganographic or a cryptographic technique.