Work place: B. C. Roy Engineering College, Durgapur, WB, INDIA
E-mail: saurabh.dutta@bcrec.org
Website:
Research Interests: Information Security, Information Systems, Information Retrieval, Information-Theoretic Security
Biography
Saurabh Dutta is a professor in Dr. B. C. Roy Engineering College. He holds a Ph. D Degree in Coputer Science. His research domain is information security and cryptology.
By Sabyasachi Samanta Saurabh Dutta Gautam Sanyal
DOI: https://doi.org/10.5815/ijieeb.2015.03.08, Pub. Date: 8 May 2015
Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content.
[...] Read more.By Sabyasachi Samanta Saurabh Dutta Goutam Sanyal
DOI: https://doi.org/10.5815/ijcnis.2014.01.08, Pub. Date: 8 Nov. 2013
Usually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The nonlinear character positions of different pages are targeted through out the cover with insignificant modification. As compared to other methods, we believe that the approaches proposed convey superior randomness and thus support higher security.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals