International Journal of Computer and Communication Technology


In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and steganography. We take image as the carrier to use steganography. By using our own substitution cipher called two square reverse we encrypt the secret information. Then the cipher text of the secret information is embedded into the carrier image in LSB (least significant bit) minus one position of some selected bytes. The byte selection is done depending on the bit pattern of the secret information. Thus the embedding locations are dependent on the secret message. So the intruder will face difficulties to locate the bits. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse operation what the sender has done and get the secret information.




To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.