Title: Some new methodologies for secured data coding and transmission

Authors: G. Sahoo, Rajesh Kumar Tiwari

Addresses: Department of Information Technology, BIT Mesra, Ranchi, Jharkhand, India. ' Department of Computer Science and Engineering, GLNA Institute of Technology, Mathura, Uttar Pradesh, India

Abstract: In this fast growing digital world, the dramatic rise and progress of the internet have opened a path to connect a computer in the world to any other computer, no matter how far the two are located form each other. This is undoubtedly a great advantage for any individual and corporate as well. However, this can be a nightmare for network support staff, to maintain least amount of payload with utmost security. As a solution, cryptographic algorithm alone is not sufficient as, it creates the heavy payload. In the other solution, the highly secured steganographic algorithm requires high capacity carriers for data transfer. To overcome, we have designed a new methodology which hides the secret data inside the secret data which reduces 50% of payload with high layer of securities. The proposed methodologies have been implemented by creating stego text creator and secret text viewer in Microsoft platform.

Keywords: steganography; cryptography; stego-key; secret data; payload; secure data coding; secure data transmission; electronic security; data hiding; security layers.

DOI: 10.1504/IJESDF.2010.033781

International Journal of Electronic Security and Digital Forensics, 2010 Vol.3 No.2, pp.120 - 137

Received: 03 Oct 2009
Accepted: 06 Jan 2010

Published online: 30 Jun 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article