Kalyan Mondal

Work place: Department of Computer Science, St. Xavier‘s College [Autonomous], Kolkata, India

E-mail: myfirstmail.k@gmail.com

Website:

Research Interests: Computational Science and Engineering, Computational Engineering, Engineering

Biography

Kalyan Mondal is currently a final-year undergraduate student at the Department of Computer Science at St. Xavier's College (Autonomous), Kolkata. His research interests include web engineering, web development using PHP and J2EE, cloud computing, graphics designing, network security, ethical hacking, etc. He has been working in the fields of web development for past four years.

Author Articles
Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm

By Somdip Dey Kalyan Mondal Joyshree Nath Asoke Nath

DOI: https://doi.org/10.5815/ijmecs.2012.06.08, Pub. Date: 8 Jun. 2012

Due to tremendous growth in communication technology, now it is a real problem / challenge to send some confidential data / information through communication network. For this reason, Nath et al. developed several information security systems, combining cryptography and steganography together, and the present method, ASA_QR, is also one of them. In the present paper, the authors present a new steganography algorithm to hide any small encrypted secret message inside QR CodeTM , which is then randomized and then, finally embed that randomized QR Code inside some common image. Quick Response Codes (or QR Codes) are a type of two-dimensional matrix barcodes used for encoding information. It has become very popular recently for its high storage capacity. The present method is ASA_QR is a combination of strong encryption algorithm and data hiding in two stages to make the entire process extremely hard to break. Here, the secret message is encrypted first and hide it in a QR CodeTM and then again that QR CodeTM is embed in a cover file (picture file) in random manner, using the standard method of steganography. In this way the data, which is secured, is almost impossible to be retrieved without knowing the cryptography key, steganography password and the exact unhide method. For encrypting data The authors used a method developed by Nath et al i.e. TTJSA, which is based on generalized modified Vernam Cipher, MSA and NJJSA method; and from the cryptanalysis it is seen that TTJSA is free from any standard cryptographic attacks, like differential attack, plain-text attack or any brute force attack. After encrypting the data using TTJSA,the authors have used standard steganographic method To hide data inside some host file. The present method may be used for sharing secret key, password, digital signature etc.

[...] Read more.
Other Articles