Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography
Keywords:
Modified Playfair cipher, Image Steganography, LSB encoding, Image Encryption, Linear Congruential Generator, Blum Blum Shub, Pseudo Random Number GeneratorsAbstract
With the mounting significance of data security over the network, steganography and cryptography are two emerging fields of research. Steganography is the technique in which confidential data is concealed in a cover medium. Cryptography is an approach of translating the personal data to some unintelligible form to keep it safe from intruders. Steganography and Cryptography attempt to accomplish identical objective of data security via different means. In this paper, the authors state a novel system to mask secret data. The confidential text is encrypted using modified Playfair cipher in the first step. In the second step, the cipher text is subjected to image steganography. In this step, the cipher text is embedded into the image using LSB encoding. To further enhance the concealment of the message, the image is subjected to a two-level simple but secure symmetric key encryption which comprises of two image encryption algorithms. These encryption algorithms use two pseudo random number generators that is Linear Congruential Generator and Blum Blum Shum algorithm.
References
Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi
Derek Bruff, Ph.D, The Playfair Cipher Revealed Wynne MLAS 280-07 Cryptography July 13, 2009
William Stallings,” Cryptography and Network Security”, 5th Edition
Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah, “An Extension to Traditional Playfair Cryptographic Method”, International Journal of Computer Applications (0975 – 8887)Volume 17– No.5, March 2011
S. Das, B. Bandyopadhyay and S. Sanyal, “Steganography and Steganalysis: different approaches”, Cornell University Library, 2011
Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications (09758887) Volume 1 – No. 15
“A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, National Institute of Standards and Technology, Special Publication 800-22 Revision 1a.
An article on Linear Congruential Generator is available “http://en.wikipedia.org/wiki/Linear_congruential_generator”.
Nishith Sinha, Anirban Bhowmick, Kishore B, “Encrypted Information Hiding using Audio Steganography and Audio Cryptography”, International Journal of Computer Applications (0975 – 8887) Volume 112 – No. 5, February 2015
M U Bokhari, Shadab Alam, Faheem Syeed Masoodi, “Cryptanalysis techniques for Stream Cipher: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No 15, October 2014
Andrew S Tanenbaum, “Computer Networks”, 4th Edition
Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, “Image Steganography and Steganalysis: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 52– No.2, August 2012
Shreenandan Kumar, Suman Kumari, Sucheta Patro, Tushar Shandilya, Anuja Kumar Acharya, “Image Steganography using Index based Chaotic Mapping”, International Journal of Computer Applications (0975 – 8887) International Conference on Distributed Computing and Internet Technology (ICDCIT-2015)
Saurabh V. Joshi Ajinkya A. Bokil Nikhil A. Jain Deepali Koshti, “Image Steganography Combination of Spatial and Frequency Domain”, International Journal of Computer Applications (0975 – 8887) Volume 53– No.5, September 2012
Nitin Kaul, Nikesh Bajaj, “Audio in Image Steganography based on Wavelet Transform”, International Journal of Computer Applications (0975 – 8887) Volume 79 – No3, October 2013
Ajit Singh, Swati Malik, “Securing Data by Using Cryptography with Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 ISSN: 2277 128X
Firas A. Jassim, “A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method”, International Journal of Computer Applications (0975 – 8887) Volume 72– No.17, June 2013
Dipti Kapoor Sarmah, Neha Bajpai, “Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887)Volume 8– No.9, October 2010
Unik Lokhande, A. K. Gulve, “Steganography using Cryptography and Pseudo Random Numbers”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.19, June 2014
V. Lokeswara Reddy, B. Sailendar, “Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No 11, October 2014
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Bhowmick A, Kapur V, Paladi ST

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
