Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 4, April 2015

Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption

Akash V. Malasane, S. P. Bhonge

Metamorphic cryptography is the inconsistency between of cryptography and steganography. This combination will be used for the higher level of security has gained a lot of importance. Cryptography refers to the study of art and science for achieving security by encode the messages to make them sure that the data is not readable. The readable message is converted into an unreadable message by using cryptographic system, this process called as well-structured and systematic, antithesis operation is performed by using cryptanalysis that means unreadable message is converted into a readable message, this process called as error and trial based. Steganography is the technique that give the skill to hide the massages that is to be kept secret inside other messages. Before The art and science of writing hidden messages in such a way that no one can access this information expect sender and receiver.This paper provides a higher level of security for hide the information messages by using development of system for video based metamorphic encryption.

Keywords: Cryptography, Steganography, Metamorphic encryption, metamorphic decryption, key

Edition: Volume 4 Issue 4, April 2015

Pages: 2014 - 2019

Share this Article

How to Cite this Article?

Akash V. Malasane, S. P. Bhonge, "Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=16041503, Volume 4 Issue 4, April 2015, 2014 - 2019

47 PDF Views | 40 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2338 - 2341

SOC Based Cryptosystem Implementation Using RC4 and IDEA Algorithm

Surekha Pujar, Sleeba Mathew

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2466 - 2469

Data Protection Using Virtual Identity and Modified RSA

Rishin Ali K, Mohammed Aslam V.N

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2517 - 2521

A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform

Y. S. Thakur, Brij Mohan Kumar

Share this Article

Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 213 - 216

A Secured Data Hiding Technique Using Video Sequences

Y. Mahendhar, B. Satish Chandra

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2517 - 2521

A Robust and Secure Steganography Scheme based on Singular Values Decomposition and Discrete Wavelet Transform

Y. S. Thakur, Brij Mohan Kumar

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2213 - 2216

New Approach for Image Hiding By Using Block Transformation

Khushboo Dhoke, Shubhangi Dhengre

Share this Article

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 4, April 2014

Pages: 398 - 402

A Survey on Cryptography and Steganography

Niveditha R

Share this Article

Similar Articles with Keyword 'key'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 508 - 513

Saliency Technique for Efficient Back Ground Subtraction

Aiswarya Muralidharan, S. Sivakumar

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1102 - 1107

Analysis of Stream Ciphers Based on Theoretic Approach

Shisif Pokhrel, Ahmed Abdul Kadhim Basheer

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1843 - 1847

Design of 8 x 8 Vedic Multiplier using Quaternary-Logic & Pipelining Architecture

Vivek D. Wanjari, Prof. R. N. Mandavgane, Prof. Shailesh Sakhare

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1503 - 1506

Implementation of KL Algorithm for Partitioning using Perl

Swapnil D. Ninawe, Pranali D. Surkar

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 3, March 2014

Pages: 642 - 645

Low Power and Area Optimized VHDL Implementation of AES

Suja Chackochan, K. Mathan

Share this Article
Top