Work place: Haldia Institute of Technology, Haldia, WB, INDIA
E-mail: sabyasachi.smnt@gmail.com
Website:
Research Interests: Hardware Security, Information Security, Network Security
Biography
Sabyasachi Samanta is working as Assistant Professor at Dept. of IT, Haldia Institute of Technology Haldia, WB, and India. He has received M. Tech Degree in IT and currently pursuing Ph. D at National Institute of Technology,
Durgapur, WB, India. His main research interest includes watermarking, steganography and cryptography.
By Sabyasachi Samanta Saurabh Dutta Gautam Sanyal
DOI: https://doi.org/10.5815/ijieeb.2015.03.08, Pub. Date: 8 May 2015
Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content.
[...] Read more.By Sabyasachi Samanta Saurabh Dutta Goutam Sanyal
DOI: https://doi.org/10.5815/ijcnis.2014.01.08, Pub. Date: 8 Nov. 2013
Usually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The nonlinear character positions of different pages are targeted through out the cover with insignificant modification. As compared to other methods, we believe that the approaches proposed convey superior randomness and thus support higher security.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals