International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique

Anand L S, Prajwal S Sanket, Sharath R V, Varun R

Cryptography is an art of making the data unintelligible to third party other than the sender and receiver. The security for data can be implemented using public and private cryptography. The data is made secure using many data encryption techniques. We have proposed an advanced technique of encryption involving unique VPASS Algorithm. Original work related this includes the playfair technique and since then modification to this have been proposed. Our scheme involves the use of unique VPASS matrix to encrypt the messages. Security of the message can be enhanced by using a steganography technique. Steganography is the art of concealing the existence of information within seemingly harmless carriers. In this paper we have proposed a revised information hiding scheme using VPASS technique. Original work related to our scheme includes the Chang et al method of information hiding. The Chang et al method can be implemented for greyscale images but our method can be implemented for colour images.

Keywords: Steganography, embedding, VPASS, reference matrix

Edition: Volume 2 Issue 5, May 2013

Pages: 293 - 296


How to Cite this Article?

Anand L S, Prajwal S Sanket, Sharath R V, Varun R, "A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013991, Volume 2 Issue 5, May 2013, 293 - 296

24 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article

Similar Articles with Keyword 'embedding'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2081 - 2083

Survey of Approximate Shortest Distance Computing Using Improved Shortest Path Tree

Sonali Malode, Mansi Bhonsle

Share this article

Top