Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography

Authors

  • Bhowmick A Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India
  • Kapur V Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India
  • Paladi ST Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India

Keywords:

Modified Playfair cipher, Image Steganography, LSB encoding, Image Encryption, Linear Congruential Generator, Blum Blum Shub, Pseudo Random Number Generators

Abstract

With the mounting significance of data security over the network, steganography and cryptography are two emerging fields of research. Steganography is the technique in which confidential data is concealed in a cover medium. Cryptography is an approach of translating the personal data to some unintelligible form to keep it safe from intruders. Steganography and Cryptography attempt to accomplish identical objective of data security via different means. In this paper, the authors state a novel system to mask secret data. The confidential text is encrypted using modified Playfair cipher in the first step. In the second step, the cipher text is subjected to image steganography. In this step, the cipher text is embedded into the image using LSB encoding. To further enhance the concealment of the message, the image is subjected to a two-level simple but secure symmetric key encryption which comprises of two image encryption algorithms. These encryption algorithms use two pseudo random number generators that is Linear Congruential Generator and Blum Blum Shum algorithm.

References

Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi

Derek Bruff, Ph.D, The Playfair Cipher Revealed Wynne MLAS 280-07 Cryptography July 13, 2009

William Stallings,” Cryptography and Network Security”, 5th Edition

Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah, “An Extension to Traditional Playfair Cryptographic Method”, International Journal of Computer Applications (0975 – 8887)Volume 17– No.5, March 2011

S. Das, B. Bandyopadhyay and S. Sanyal, “Steganography and Steganalysis: different approaches”, Cornell University Library, 2011

Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications (09758887) Volume 1 – No. 15

“A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, National Institute of Standards and Technology, Special Publication 800-22 Revision 1a.

An article on Linear Congruential Generator is available “http://en.wikipedia.org/wiki/Linear_congruential_generator”.

Nishith Sinha, Anirban Bhowmick, Kishore B, “Encrypted Information Hiding using Audio Steganography and Audio Cryptography”, International Journal of Computer Applications (0975 – 8887) Volume 112 – No. 5, February 2015

M U Bokhari, Shadab Alam, Faheem Syeed Masoodi, “Cryptanalysis techniques for Stream Cipher: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No 15, October 2014

Andrew S Tanenbaum, “Computer Networks”, 4th Edition

Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, “Image Steganography and Steganalysis: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 52– No.2, August 2012

Shreenandan Kumar, Suman Kumari, Sucheta Patro, Tushar Shandilya, Anuja Kumar Acharya, “Image Steganography using Index based Chaotic Mapping”, International Journal of Computer Applications (0975 – 8887) International Conference on Distributed Computing and Internet Technology (ICDCIT-2015)

Saurabh V. Joshi Ajinkya A. Bokil Nikhil A. Jain Deepali Koshti, “Image Steganography Combination of Spatial and Frequency Domain”, International Journal of Computer Applications (0975 – 8887) Volume 53– No.5, September 2012

Nitin Kaul, Nikesh Bajaj, “Audio in Image Steganography based on Wavelet Transform”, International Journal of Computer Applications (0975 – 8887) Volume 79 – No3, October 2013

Ajit Singh, Swati Malik, “Securing Data by Using Cryptography with Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 ISSN: 2277 128X

Firas A. Jassim, “A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method”, International Journal of Computer Applications (0975 – 8887) Volume 72– No.17, June 2013

Dipti Kapoor Sarmah, Neha Bajpai, “Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887)Volume 8– No.9, October 2010

Unik Lokhande, A. K. Gulve, “Steganography using Cryptography and Pseudo Random Numbers”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.19, June 2014

V. Lokeswara Reddy, B. Sailendar, “Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No 11, October 2014

Downloads

Published

2015-03-31

How to Cite

[1]
A. Bhowmick, V. Kapur, and S. T. Paladi, “Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography”, Int. J. Comp. Sci. Eng., vol. 3, no. 3, pp. 7–12, Mar. 2015.

Issue

Section

Research Article