A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique

Anand L S, Prajwal S Sanket, Sharath R V, Varun R

Cryptography is an art of making the data unintelligible to third party other than the sender and receiver. The security for data can be implemented using public and private cryptography. The data is made secure using many data encryption techniques. We have proposed an advanced technique of encryption involving unique VPASS Algorithm. Original work related this includes the playfair technique and since then modification to this have been proposed. Our scheme involves the use of unique VPASS matrix to encrypt the messages. Security of the message can be enhanced by using a steganography technique. Steganography is the art of concealing the existence of information within seemingly harmless carriers. In this paper we have proposed a revised information hiding scheme using VPASS technique. Original work related to our scheme includes the Chang et al method of information hiding. The Chang et al method can be implemented for greyscale images but our method can be implemented for colour images.

Keywords: Steganography, embedding, VPASS, reference matrix

Edition: Volume 2 Issue 5, May 2013

Pages: 293 - 296

Share this Article

How to Cite this Article?

Anand L S, Prajwal S Sanket, Sharath R V, Varun R, "A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013991, Volume 2 Issue 5, May 2013, 293 - 296

77 PDF Views | 72 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 842 - 846

An Efficient Technique of Steganography

Latika, Yogita Gulati

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2420 - 2425

Data hiding Using Texture Synthesis with Watermarking

Aruna M P, Maya Mathew

Share this Article

Similar Articles with Keyword 'embedding'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2081 - 2083

Survey of Approximate Shortest Distance Computing Using Improved Shortest Path Tree

Sonali Malode, Mansi Bhonsle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article
Top