An Application of the Crystography
-
3803
Downloads
-
5479
Views
Authors
Haci Akta
- Erciyes University, Kayseri.
Mehmet Kalkan
- Nevşehir Hacı Bektaş Veli University, Nevşehir.
Abstract
A combination of cryptography and steganography is very important to information safety. Because
together, they will not only hide but also encrypt the information at the same time. In the most
crystographic studies, they hide the cipher text (encrypted) into the image, video or audio files to transfer.
In this paper, we will give a simple and more convenient example for Crystography. We can also say that
this method is applicable for most of the cryptographic algorithms to transfer them to the crystographic
algorithm. As a simple example, it can be applicable for ATM card passwords etc. And then we have
created and applied our method by using C# program language.
Share and Cite
ISRP Style
Haci Akta, Mehmet Kalkan, An Application of the Crystography, Journal of Mathematics and Computer Science, 11 (2014), no. 2, 147-158
AMA Style
Akta Haci, Kalkan Mehmet, An Application of the Crystography. J Math Comput SCI-JM. (2014); 11(2):147-158
Chicago/Turabian Style
Akta, Haci, Kalkan, Mehmet. "An Application of the Crystography." Journal of Mathematics and Computer Science, 11, no. 2 (2014): 147-158
Keywords
- Cryptography
- Steganography
- Pi
- Crystography.
MSC
References
-
[1]
A. R. Aparajita, STEGNOGRAPHY---The Art of Hiding Information, A Comparison from Cryptography, International Journal of Innovative Research in Science, Engineering and Technology, Copyright to IJIRSET www.ijirset.com, 1308, Vol. 2, Issue 5 (2013)
-
[2]
D. Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-hoon Kim, Text Steganography: A Novel Approach, International Journal of Advanced Science and Technology, Vol. 3 (2009)
-
[3]
F. Borges, R. Portugal, J. Oliveira , Steganography with Public-Key Cryptography for Video conference, National Laboratory of Scientific Computing - LNCC, 25651-075, Petrópolis, RJ. (2007)
-
[4]
A. M. A. Brifcani, Stego-Based-Crypto Technique for High Security Applications, Stego-Based-Crypto Technique for High Security Applications , 2 (2010), 1793-8201
-
[5]
K. Challita, H. Farhat , Combining Steganography and Cryptography: New Directions, IJNCAA, SDIWC, (ISSN 2220-9085), 1(1) (2011), 199-208
-
[6]
S. Channalli, A. Jadhav, Steganography An Art of Hiding Data, International Journal on Computer Science and Engineering, 1(3) (2009), 137-141.
-
[7]
N. N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science, 3 (4) (2007), 223-232.
-
[8]
S. Gorla , Combination of cryptography and teganography for secure communication in video file, Master Thesis, California State University, Sacremento (2009)
-
[9]
N. Hamid et al, Image Steganography Techniques: An Overview, IJCSS, Volume (6) : Issue (3) (2012)
-
[10]
S. A. Laskar, K. Hemachandran, Secure Data Transmission Using Steganography and Encryption Technique, International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.3 (2012)
-
[11]
A. B. Mansoor, Z. Khan, S. A. Khan, CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security, Mehran University Research Journal of Engineering & Technology, Volume 31, No. 2 (2012)
-
[12]
Maria Akhtar Mufti, Aihab Khan, Malik Sikandar Hayat Khiyal, Asim Munir, Transmitting Cryptographic data through Steganography, IJCSI International Journal of Computer Science Issues, 9 (2012), ISSN (Online): 1694-0814
-
[13]
Ochin Evgeny, Larisa Dobryakova, Zbigniew Pietrzykowski, Piotr Borkowsk, The application of cryptography and steganography in the integration of seaport security subsystems Zastosowanie kryptografii i steganografii w integracji podsystemów bezpieczeństwa informacyjnego portów morskich, Zeszyty Naukowe Akademia Morska w Szczecinie, 26(98) (2011), 80-87.
-
[14]
M. H. Rajyaguru, CRYSTOGRAPHY-Combination of Cryptography and Steganography With Rapidly Changing Keys, IJETAE, Volume 2, Issue 10 (2012)
-
[15]
Amir Ehsani, An Application of Co-Medial Algebras with Quasigroup Operations on Cryptology, TJMCS , 10 (2014), 113-118.
-
[16]
A. J. Raphael, Dr. V. Sundaram, Cryptography and Steganography -- A Survey, ISSN:2229-6093, IA.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., 2 (3) (), 626-630.
-
[17]
N. Saran, Kriptografideki Güncel Çalışmalar, Mühendislik ve Teknoloji Sempozyumu, Çankaya Üniversitesi , Ankara (2009)
-
[18]
, , http://tr.wikipedia.org, (2013)
-
[19]
H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin, G. Ribordy, Quantum cryptography, Appl. Phys. B, 67 (1998), 743–748.
-
[20]
S. H. Kamali, M. Hedayati, R. Shakerian, S. Ghasempour, Using Identity-Based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing, TJMCS, 3(4) (2011), 357 – 375.