Loading

Encryption and Decryption Using Hybrid Cryptography Techniques and Multi-level Steganography
Shubhankar Saxena1, Anushka Sharma2

1Shubhankar Saxena, B Tech. in Electronics and Communication Engineering, Vellore Institute of Technology, Vellore, India.
2Anushka Sharma, B Tech. in Electronics and Communication Engineering, Vellore Institute of Technology, Vellore, India.

Manuscript received on 30 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 40-45 | Volume-8 Issue-9, July 2019 | Retrieval Number: I7472078919/19©BEIESP | DOI: 10.35940/ijitee.I7472.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data Encryption, in the present time, is used to deter malicious parties from accessing sensitive data, allowing the access to only authorized parties as it uses the key to safeguard the sensitive information to be transferred. Various cryptography techniques are used to maintain confidentiality and integrity of the data, and this paper proposes the hybrid scheme of using four layers of encryption including steganography to safeguard the authenticity of the information to be transferred. In this paper, three conventional key cryptography algorithms, which are Fibonacci series, XOR cipher and PN sequence encryption, are used along with RSA cryptography which is a public key cryptography algorithm. In addition to it, steganography technique is also used in the last two layers of our proposed model. Firstly, the whole of the encrypted string, obtained after the above cryptography algorithms, is hidden inside the first image. Now this encrypted host image is further hidden inside another image by using one bit LSB algorithm. This model offers the double security of the data as here the data is not only encrypted but also hidden in an image which again is hidden inside another image making it very hard even to detect the data.
Keywords: Cryptography, Encryption, Decryption, Fibonacci series, LSB, PN sequence, RSA, steganography, XOR cipher.

Scope of the Article: Cryptography and Applied Mathematics