B. Karthikeyan, P. Nishmitha, B. Poojasree, S. Asha
{"title":"图像隐写中的Rabin-Karp秘密信息认证","authors":"B. Karthikeyan, P. Nishmitha, B. Poojasree, S. Asha","doi":"10.1109/ICCS45141.2019.9065849","DOIUrl":null,"url":null,"abstract":"This paper explicitly gives an inventive way to transfer the data without getting disrupted by using the methodologies of Steganography and Cryptography. Applying the strategies of Rabin-Karp, which is used to find the hash code for the message to be encrypted and Rotor Machine, which encrypts the message helps to protect the data from attackers. The coding has been implemented in MATLAB. After the implementation of the code, it is verified using the parameters called PSNR and MSE and obtained the clear results.","PeriodicalId":112413,"journal":{"name":"International Conference Intelligent Computing and Control Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authentication of Secret Message using Rabin-Karp in Image Steganography\",\"authors\":\"B. Karthikeyan, P. Nishmitha, B. Poojasree, S. Asha\",\"doi\":\"10.1109/ICCS45141.2019.9065849\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explicitly gives an inventive way to transfer the data without getting disrupted by using the methodologies of Steganography and Cryptography. Applying the strategies of Rabin-Karp, which is used to find the hash code for the message to be encrypted and Rotor Machine, which encrypts the message helps to protect the data from attackers. The coding has been implemented in MATLAB. After the implementation of the code, it is verified using the parameters called PSNR and MSE and obtained the clear results.\",\"PeriodicalId\":112413,\"journal\":{\"name\":\"International Conference Intelligent Computing and Control Systems\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference Intelligent Computing and Control Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS45141.2019.9065849\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference Intelligent Computing and Control Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication of Secret Message using Rabin-Karp in Image Steganography
This paper explicitly gives an inventive way to transfer the data without getting disrupted by using the methodologies of Steganography and Cryptography. Applying the strategies of Rabin-Karp, which is used to find the hash code for the message to be encrypted and Rotor Machine, which encrypts the message helps to protect the data from attackers. The coding has been implemented in MATLAB. After the implementation of the code, it is verified using the parameters called PSNR and MSE and obtained the clear results.