A Study on Data Hiding Technique Using Prime Numbers

Authors

  • K. Ravikumar  Assistant Professor, Department of Computer Science, Tamil University (Established by the Govt. of. Tamilnadu), Thanjavur, Tamil Nadu, India
  • R. Raja  Research Scholar, Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT1952186

Keywords:

Prime Factorization, Cryptography, PI, DNA, Cipher Text, Plain Text, Key, Encryption, Decryption.

Abstract

In a globe full of communications, it is necessary to guard the data in arrange to make certain the isolation of the users. There is a lot of responsive data present in the mesh and it requirements. A novel data hitting technique is future, as an development over the Fibonacci LSB data-hiding technique. The traditional LSB technique is the simplest, but using this method it is promising to implant only in few bit-planes, since picture excellence becomes radically misshapen when embed in higher bit-planes. Battista et al. proposed an development over this by using Fibonacci putrefaction modus operandi and generate a deferent set of practical bit-planes all mutually, thereby growing the numeral of bit-planes. we propose two new hashing functions, prime modulo and odd-multiplier displacement, that are resistant to pathological behaviour and yet are able to eliminate the worst-case disagreement performance in the L2 cache. We show that these two schemes can be implemented in fast hardware using a set of thin totalling operation, with insignificant disintegration in the L2 hoard. We assess the scheme on 23 reminiscence intensive applications. It produces different secret message text for the same plain text which confuses the hacker to attain the unique text and makes it near impossible to break it.

References

  1. F. Battisti, M. Carli, A. Neri, K. Egiaziarian, A Generalized Fibonacci LSB Data Hiding Technique, 3rd International Conference on Computers and Devices for Communication (CODEC-06), Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006.
  2. C. Shao-Hui, Y. Tian-Hang, G. Hong-Xun, Wen, A variable depth LSB data hiding technique in images, International Conference on Machine Learning and Cybernetics, 2004,, Vol. 7, 26-29 pp.3990 – 3994, 2004.
  3. J. M. Pollard, Theorems on Factorization and Primality Testing, Procedings of Cambridge Philosophy Society, 76 (1974), 521{528}.
  4. P. Shor, Algorithms for Quantum Computation:Discrete Logarithms and Factoring , Proceedings of 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, 1994,124-134.
  5. R. D. Silverman, The Multiple Polynomial Quadratic Sieve , Mathematics of Computation, 48 (1987), 329-339.
  6. Tutubalin Pavel Innokentievich, Mokshin Vladimir Vasilevich, "The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms", In the Proceeding of the 2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC), pp.180-183, 2017.
  7. Partha Sarathi Goswami, Tamal Chakraborty, Harekrishna Chatterjee, "A Novel Encryption Technique Using DNA Encoding and Single Qubit Rotations", International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.364-369, 2018.
  8. Tausif Anwar, Abhishek Kumar, Sanchita Paul, "DNA Cryptography Based on Symmetric Key Exchange", International Journal of Engineering and Technology (IJET), Vol.7, No.3, pp.938-950, Jun-July 2015.
  9. M. Kharbutli, K. Irwin, Y. Solihin, and J. Lee, "Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses," Proc. Int'l Symp. High Performance Computer Architecture, 2004.
  10. V. Krishnan and J. Torrellas, "A Direct-Execution Framework for Fast and Accurate Simulation of Superscalar Processors," Proc. Int'l Conf. Parallel Architectures and Compilation Techniques, Oct. 1998.
  11. D. H. Lawrie and C.R. Vora, "The Prime Memory System for Array Access," IEEE Trans. Computers, vol. 31, no. 5, May 1982.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
K. Ravikumar, R. Raja, " A Study on Data Hiding Technique Using Prime Numbers, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.619-623, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT1952186