A PHP Error was encountered

Severity: Notice

Message: Only variable references should be returned by reference

Filename: core/Common.php

Line Number: 257

Journal of Excellence in Computer Science and Engineering

Archives


Rate this Article: (0) Votes

Research Article

Year : 2015 | Volume: 1 | Issue: 2 | Pages: 11-22

A Secure Steganographic Method for Efficient Data Sharing in Public Clouds

V.G Gopika1*, Neetha Alex2

http://dx.doi.org/doi:10.18831/djcse.in/12015021002

Corresponding author

V.G Gopika*

PG Student, Department of Computer Science and Engineering, TKM Institute of Technology, Kollam, Kerala, India.

  • 1. PG Student, Department of Computer Science and Engineering, TKM Institute of Technology, Kollam, Kerala, India.

Received on: 2015/11/12

Revised on: 2015/12/13

Accepted on: 2015/12/15

Published on: 2015/12/29

  • A Secure Steganographic Method for Efficient Data Sharing in Public Clouds, V.G Gopika, Neetha Alex, 2015/12/29, Journal of Excellence in Computer Science and Engineering, 1(2), 11-22, http://dx.doi.org/10.18831/djcse.in/12015021002.

    Published on: 2015/12/29

Abstract

Data relaying process through internet has become more faster which makes it easier to send the data precisely to the destination. Security and transmission time are the most important factors of data transmission. The proposed system improves these factors using the concepts of cryptography and steganography. In this paper, the data hiding technique is implemented in encryption-decryption domain, by joining the concepts of steganography and public key cryptography using the sequence encryption-compression then decompression-decryption. The proposed system uses the mediated certificate less encryption (mCL-PKE) scheme which is combined with the data hiding scheme for providing more confidentiality in public key cryptography. The main idea is to implement the separable reversible data hiding scheme into the mCL-PKE scheme where the cover media decryption and hidden data freeing are separated based on the availability of keys. Among the various steganographic algorithms like Least Significant Bit (LSB) algorithm, Jsteg and F5 algorithms, the proposed system uses F5 algorithm which possess the matrix encoding technique that provides high steganographic capacity and can also prevent visual and statistical attacks.

Keywords

Cloud computing, Cryptography, Separable reversible data hiding, Data security, Confidentiality.