Main Article Content

Abstract

This paper deals with the secure transformation of text. Encryption is the most common method of hiding text from unauthorized access. Two popular ways of sending personal information in a secret way are Cryptography and Steganography. To hide the existence of the message as well as distorts the message itself using this method. LSB and ELSB are the advanced techniques used to hide text in the image. There are two levels to hide the secret information. In the first level of hiding text, data sent to images by using the password and in second level encryption of 2D Cellular Automata used to enhance more security. If one level of security technique is broken by third person then there will be one more level to provide security to that secret information. Encryption will do using 2 dimensional rules of Cellular Automata. The use of Cellular Automata rules is for the parallelism which provides high security during storing and communicating, higher compression ratio and higher encoding of data while comparing with the available security techniques.

Keywords

Cryptography Steganography LSB ELSB 2D Cellular Automata.

Article Details

How to Cite
., M. (2017). DATA SECURITY USING 2D CELLULAR AUTOMATA RULES. International Journal of Students’ Research in Technology & Management, 5(1), 05–08. https://doi.org/10.18510/ijsrtm.2017.512

References

  1. . S. Wolfram, “Cryptography with Cellular Automata in Advances in Cryptologyâ€, Crypto ’85 Proceedings, Volume 218 of Lecture Notes in Computer Science, Pages 429–432 (Springer- Verlag, Heidelberg, 1986). DOI: https://doi.org/10.1007/3-540-39799-X_32
  2. . S. Nandi, B. K. Kar, and P. P. Chaudhuri, “Theory and Applications of Cellular Automata in Cryptography,†IEEE Transactions on Computers,Volume 43(12), Pages 1346–1357, December,1994. DOI: https://doi.org/10.1109/12.338094
  3. . M Phani Krishna Kishore and S KanthiKiran “A Novel Encryption System using Layered Cellular Automataâ€, Proceedings of the World Congress on Engineering, Volume 1,July 6 - 8, 2011
  4. . K.Hemachandran, “Study of Image Steganography using LSB, DFT and DWTâ€, International Journal of Computers & Technology, vol 11, oct.25 2013, pp. 2618-2627 DOI: https://doi.org/10.24297/ijct.v11i5.1143
  5. . Zin.w, soe. N “Implementation and Analysis of three Steganographic Approachesâ€, University of Computer Studies, Mandalay, 2011, pp. 456-460
  6. . Manoj.S, “ Cryptography and Steganographyâ€, International Journal of Computer Applications (0975-8887),2010, vo1-no.12, pp.63-68 DOI: https://doi.org/10.5120/257-414
  7. . Pratibha Sharma, ManojDiwakar, NiranjanLal,“Edge Detection using Moore Neighborhoodâ€,InternationalJournal Of Computer Applications,Volume 61– No.3, January 2013, Pages26-30. DOI: https://doi.org/10.5120/9910-4506
  8. . Pratibha Sharma, ManojDiwakar, SangamChoudhary, “Application of Edge Detection in Brain Tumor Detectionâ€, International Journal Of Computer Applications, Volume 58– No.16,November 2012, Pages21-25. DOI: https://doi.org/10.5120/9366-3820
  9. . PradiptaMaji, Chandrama Shaw, Niloy Ganguly,Biplab K. Sikdar and P. Pal Chaudhuri, “Theory and Application of Cellular Automata For Pattern Classificationâ€, IOS Press, FundamentalInformaticae 58 (2003), Pages 321–354.
  10. . http://www.iosrjournals.org/iosr-jce/full-issue/vol4-issue1.pdf
  11. . https://en.wikibooks.org/wiki/Cellular_Automata/Neighborhood