Securing information for commercial file sharing by combining raster graphic and vector graphic stseganographies

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Commercial applications cannot declare use of steganography as its security model so as not to spoil the norm of “hidden” secret. Proposed paper suggests a model that can withhold security even after declaration of steganography’s presence allowing applicability in commercial scope. File to be secured is compressed and converted to byte stream and hidden in both raster graphic and vector graphic cover images and encapsulated in a PDF and shared. To extract the secured file from the cover images a key is required by the party intending to receive the secured file. This key is shared by Elliptic Curve Diffie Hellman Key Agreement Protocol. The intended receiver extracts the file by applying steganalysis. To implement this model an android application is developed that shares files by securing it in aforesaid fashion and transferring them via Wi-Fi Direct. Most of the digital image steganography researched are based on raster graphic cover images. The proposed model is designed so that limitations present in raster and vector steganographies each can be counterfeited to produce a secure solution that can be offered in digital image steganography. This solution is suggested as security model in commercial scope.

Cite

CITATION STYLE

APA

Kashyap, R., & Ganesh, M. (2019). Securing information for commercial file sharing by combining raster graphic and vector graphic stseganographies. International Journal of Engineering and Advanced Technology, 8(6), 788–795. https://doi.org/10.35940/ijeat.F8005.088619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free