Skip to main content
Secure Data Transmission using Encrypted Secret Message
International Journal of Computer Science and Information Technologies (2013)
  • Jaishree Singh
  • Dr. J.S. Sodhi
In any communication, security is the most important issue in today’s world. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system in which two techniques, steganography and cryptography are combined, which provides a strong backbone for its security. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. In this project work, the secret message is encrypted before the actual embedding process starts. The hidden message is encrypted using Tiny algorithm using secret key and DCT technique is used for embedding and extraction file.
  • Steganography,
  • Cryptography,
  • Encryption,
  • Data hiding
Publication Date
April, 2013
Publisher Statement

Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar “Cryptography of Video InformationIn Modem communica-tion”, Electronics And Energefics, vol.11, pp. 115-125, 1998

Wheeler D., and R. Needham. TEA, a Tiny Encryption Algorithm, Proceedings of the Second International Workshop on Fast Software Encryption, Springer-Verlag, 1995, pp. 97-110.

National Institute of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46. January 1977

Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004

Chandramouli, R., Kharrazi, M. & Memon, N., “Image Steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003

Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston. London, 2000.

Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999

C. Cachin, “An Information-theoretic Model for steganography”, in proceeding 2nd Information Hiding Workshop, vol.1525, pp.306-318,1998

Neil F. Johnson, Zoran uric,Sushil. Jajodia, ” Information Hiding: steganography and Watermarking – Attacks and Countermeasures”, Kluwer Academic Press, Norwrll, MA,New York, 2000

J. Zollner, H. Federrath, H. Klimant,et al.,“Modeling the Security of Systems”, Steganographic in 2nd Workshop on Informafion Hiding, Portland, April 1998, pp. 345-355. proceeding of IEEE, pp. 1062-1078, July1999.

N. F. Johnson and S. Katzenbeisser, .A survey of steganographic techniques., in S. Katzenbeisser and F. Peticolas (Eds.): Information Hiding, pp.43-78. Artech House, Norwood, MA, 2000.

Currie, D.L. & Irvine, C.E., “Surmounting the effects of lossy compression on Steganography”, 19th National Information Systems Security Conference, 1996

M. M Amin, M. Salleh, S. Ibrahim, M .R. Katmin, and M. Z. I. Shamsuddin,“ Information Hiding using Steganography”, IEEE 0-7803- 7773-March 7,2003

Advanced Steganography Algorithm usingencrypted secret message, Joyshree Nath and Asoke Nath, International Journal of Advanced Computer Science and Application (IJACSA) Vol-2 No.3, Page19-24,March 2011.
Citation Information
Jaishree Singh and J.S. Sodhi. "Secure Data Transmission using Encrypted Secret Message" International Journal of Computer Science and Information Technologies (2013)
Available at:
Creative Commons license
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC International License.