Stegnography is the technique of hiding
confidential information within any media. In recent years
various stegnography methods have been proposed to make
data more secure. At the same time different steganalysis
methods have also evolved. The number of attacks used by the
steganalyst has only multiplied over the years. Various tools
for detecting hidden informations are easily available over the
internet, so securing data from steganalyst is still considered a
major challenge. While various work have been done to
improve the existing algorithms and also new algorithms have
been proposed to make data behind the image more secure. We
have still been using the same public key cryptography like
Deffie-Hellman and RSA for key negotiation which is
vulnerable to both technological progress of computing power
and evolution in mathematics, so in this paper we have
proposed use of quantum cryptography along with
stegnography. The use of this combination will create key
distribution schemes that are uninterceptable thus
providing our data a perfect security.
Published In : IJCAT Journal Volume 1, Issue 9
Date of Publication : 31 October 2014
Pages : 480 - 485
Figures :04/p>
Tables : --
Publication Link : Improvising Security Issues Using Quantum
Cryptography
Abhishek Pradhan : B.Tech Student
Sushree Soujanya Padhi : B.Tech Student
B.Giridhar : Asst.prof in CSE dept
Chandan Kumar Giri : Asst.prof in CSE dept
Stegnography
Steganalysis
Steganalyst
Quantum Cryptography
Securing the key distribution is as important as securing
the data itself. In this paper we have made use of
quantum cryptography thus improving the security of
the keys and providing our data a perfect security. The
use of quantum cryptography has added another layer of
defense to our data. Even if we use most secure
encryption algorithm and best stego technique to hide
our data, if the keys gets compromised these security
will be of no use. Quantum cryptography addresses
current as well as emerging threats and it definitely has
“competitive advantage” over other public key
cryptosystems. We have used quantum cryptography
only for key distribution rather than for entire messages
because of limitations of transmission speeds and
hardware expenses.
[1] Manindra Agrawal, Neeraj Kayal, and Nitin Saxena
(2004). Primes is in P. Annals of Mathematics,
160,781-793.doi: 10.4007/annals.2004.160.781
[2] Imran Sarwar Bajwa and Rubata Raisat (2011). A
New Perfect Hashing based Approach for Secure
Stegnograph. Digital Information Management
(ICDIM),174-178. doi:
10.1109/ICDIM.2011.6093325
[3] Muhammad Asad, Junaid Gilani and Adnan Khalid
(2011). An Enhanced Least Significant Bit
Modification Technique for Audio Steganography
Computer Networks and Information Technology
(ICCNIT), 143-147. doi:
10.1109/ICCNIT.2011.6020921
[4] Mohammad Hamdaqa and Ladan Tahvildari (2011).
ReLACK: A Reliable VoIP Steganography
Approach.
Fifth International Conference on Secure Software
Integration and Reliability Improvement ,189-
197.doi: 10.1109/SSIRI.2011.24
[5] S. Changder, N.C. Debnath and D.Ghosh (2011). A
Greedy Approach to Text Steganography using
Properties of Sentences. Eighth International
Conference on Information Technology: New
Generations, 30-35. doi: 10.1109/ITNG.2011.13
[6] Piyush Marwaha and Paresh Marwaha (2010).
VISUAL CRYPTOGRAPHIC STEGANOGRAPHY
IN IMAGES. Second International conference on
Computing, Communication and Networking
Technologies, 1-6. doi:
10.1109/ICCCNT.2010.5591730
[7] Jinsuk Baek, Cheonshik Kim, Paul S. Fisher and
Hongyang Chao (2010). (N. 1) Secret Sharing
Approach Based on Steganography with Gray
Digital Images. IEEE Conference on Wireless
Communications, Networking and Information
Security (WCNIS) ,325-329.doi:
10.1109/WCINS.2010.5541793
[8] Ferruccio Pisanello, Luigi Martiradonna, Piernicola
Spinicelli, Angela Fiore and Jean-Pierre Hermier
(2009). Polarized Single Photon Emission for
Quantum Cryptography Based on Colloidal
Nanocrystals.
11th international conference on Transparent Optical
Networks,1-4. doi: 10.1109/ICTON.2009.5185131
[9] Vladimir L. Kurochkin and Igor G.Neizvestny
(2009). Quantum Cryptography. 10th
INTERNATIONAL
CONFERENCE AND SEMINAR EDM'2009, 166-
170. doi: 10.1109/EDM.2009.5173960
[10] Mehrdad S. Sharbaf (2009). Quantum Cryptography:
A New Generation of Information Technology Security System. Sixth International Conference on
Information Technology: New Generations, 1644-
1648.