S. Sriram, B. Karthikeyan, V. Vaithiyanathan, M. M. Anishin Raj
{"title":"一种利用转子密码进行加密和隐写的安全传输方法","authors":"S. Sriram, B. Karthikeyan, V. Vaithiyanathan, M. M. Anishin Raj","doi":"10.1109/ICCIC.2015.7435669","DOIUrl":null,"url":null,"abstract":"This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"An approach of cryptography and steganography using rotor cipher for secure transmission\",\"authors\":\"S. Sriram, B. Karthikeyan, V. Vaithiyanathan, M. M. Anishin Raj\",\"doi\":\"10.1109/ICCIC.2015.7435669\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.\",\"PeriodicalId\":276894,\"journal\":{\"name\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2015.7435669\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2015.7435669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An approach of cryptography and steganography using rotor cipher for secure transmission
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV framework.