

Design and Implementation of Augmented and Advanced Software Stego Archiever System
Abstract
The objective of the paper is to design and develop a Sotware model Stego Archiver that deals with 4 levels of security in terms of cryptography using RSA algorithm, Compression using Zip algorithm, CRC Checking and Steganography. In addition to these four levels of security, radix 30 method is also employed. Stego Archiver can hide the files in any image formatted file and other multimedia file formats including audio and video files. Stego Archiver is capable of hiding data in any kind of audio files including mp3 files and any kind of video files including mpg, data etc. Since CRC checking is also employed, any attempt to make any changes in original data can be find out easily.
Keywords
References
A. Menezes, P. van Oorschot, and S.Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997, p. 81 83.
Neil F. Johnson and Suishil Jajodia IEEE Computer, “Seeing the unseen”Journal, February 1998: 26-34
Neil F. Johnson, Stefan KAtzenbeisser, “A Survey of Steganographic Techniques”, Chapter 3 in Stefan Katzenbeisser (ed) Fabien A.P. Petitcolas (ed.)
Stephen Mahoney and Neil F. Johnson, workshop on Statical and Machine Learning Techniques in Computer Intrusion Detection , Audio Stegnanography and Steganlysis, Johns Hopkins University, June 11-13, 2002.
William Stallings, “Cryptography and network security, Principles and practice”, Third edition, Prentice Hall
Elliotte Rusty Harold, “Java networking (2nd edition) O’reilly”
Robert Eckstein, “Java swing “
Mr. Schneier, “Java cryptography”
Robert Lafore, “Data structure & algorithm in java”
Donald Bales, “Java programming with oracle JDBC”
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.