{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:24:28Z","timestamp":1754598268975},"reference-count":31,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p> Conventional techniques for security of data, designed by using only one of the security mechanisms, cryptography or steganography, are suitable for limited applications only. In this paper, we propose a crypto-stego system that would be appropriate for secure transmission of different forms of data. In the proposed crypto-stego system, we present a mechanism to provide secure transmission of data by multiple safety measures, firstly by applying encryption using Affine Transform and Discrete Cosine Transform (DCT) and then merging this encrypted data with an image, randomly chosen from a set of available images, and sending the image so obtained to the receiver at the other end through the network. The data to be sent over a communication channel may be a gray-scale or colored image, or a text document (doc, .txt, or .pdf file). As it is encrypted and sent hidden in an image, it avoids any attention to itself by the observers in the network. At the receiver\u2019s side, reverse transformations are applied to obtain the original information. The experimental results, security analysis and statistical analysis for gray-scale images, RGB images, text documents (.doc, .txt, .pdf files), show robustness and appropriateness of the proposed crypto-stego system for secure transmission of the data through unsecured network. The security analysis and key space analysis demonstrate that the proposed technique is immune from cryptanalysis. <\/jats:p>","DOI":"10.1142\/s0219467818500201","type":"journal-article","created":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T02:47:55Z","timestamp":1541731675000},"page":"1850020","source":"Crossref","is-referenced-by-count":5,"title":["Crypto-stego System for Securing Text and Image Data"],"prefix":"10.1142","volume":"18","author":[{"given":"Himani","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Delhi, Delhi 110007, India"}]},{"given":"D. C.","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Indian Institute of Technology Delhi, Delhi 110016, India"},{"name":"Department of Mathematics, Govt. P. G. College Jaiharikhal, Lansdowne, Uttarakhand, India"}]},{"given":"R. K.","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Indian Institute of Technology Delhi, Delhi 110016, India"}]},{"given":"Naveen","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Delhi, Delhi 110007, India"}]}],"member":"219","published-online":{"date-parts":[[2018,11,8]]},"reference":[{"key":"S0219467818500201BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2631-4"},{"key":"S0219467818500201BIB003","volume-title":"Elementary Number Theory and Its Applications","author":"Rosen K. H.","year":"1984"},{"key":"S0219467818500201BIB004","volume-title":"Cryptography and Network Security: Principles and Practices","author":"William S.","year":"2006"},{"key":"S0219467818500201BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.01.149"},{"key":"S0219467818500201BIB006","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.09.003"},{"key":"S0219467818500201BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.12.003"},{"key":"S0219467818500201BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.07.117"},{"key":"S0219467818500201BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.07.015"},{"key":"S0219467818500201BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1304-1"},{"key":"S0219467818500201BIB011","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X1450011X"},{"key":"S0219467818500201BIB012","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691314500404"},{"key":"S0219467818500201BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2012.10.016"},{"key":"S0219467818500201BIB014","doi-asserted-by":"publisher","DOI":"10.1364\/OL.32.002088"},{"key":"S0219467818500201BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/S0030-4018(02)01113-6"},{"key":"S0219467818500201BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2012.04.011"},{"key":"S0219467818500201BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2011.12.006"},{"key":"S0219467818500201BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2008.10.013"},{"key":"S0219467818500201BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.01.016"},{"key":"S0219467818500201BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2012.09.008"},{"key":"S0219467818500201BIB021","doi-asserted-by":"publisher","DOI":"10.1364\/OL.31.003438"},{"key":"S0219467818500201BIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.02.015"},{"key":"S0219467818500201BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/83.136597"},{"key":"S0219467818500201BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2006.11.005"},{"key":"S0219467818500201BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.05.044"},{"key":"S0219467818500201BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.09.013"},{"key":"S0219467818500201BIB027","volume":"8","author":"Mishra D.","year":"2013","journal-title":"Appl. Appl. Math."},{"key":"S0219467818500201BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2009.04.015"},{"key":"S0219467818500201BIB031","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"Katzenbeisser S.","year":"2000"},{"key":"S0219467818500201BIB033","volume-title":"Algebra-i: A Basic Course in Abstract Algebra","author":"Sharma R. K.","year":"2011"},{"key":"S0219467818500201BIB034","volume-title":"Digital Image Processing","author":"C G. R.","year":"2008","edition":"3"},{"key":"S0219467818500201BIB036","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X15500371"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467818500201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:09:48Z","timestamp":1565089788000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219467818500201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":31,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2018,11,8]]},"published-print":{"date-parts":[[2018,10]]}},"alternative-id":["10.1142\/S0219467818500201"],"URL":"https:\/\/doi.org\/10.1142\/s0219467818500201","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}