Steganography With Improved Cryptography

Authors

  • Gyarsia Y Department of Computer Science & Engg., SRIST, Jabalpur, India
  • Tiwari S Department of Computer Science & Engg., SRIST, Jabalpur, India

Keywords:

Image steganography, LSB, Cryptography, Symmetric Encryption, Block Cipher, Security

Abstract

With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption are the two main elements complementing each other. The steganography is the art of hidden; its main aim is to pass unnoticed data in another data. There are many types of data that used in steganography, such as message, image, and video. In this work, we are interested in hiding a message inside an image and also securing it. Our work focuses on the study of least significant bit (LSB) technique for embedding text into image. Moreover, we propose an improved approach for LSB based image steganography and encryption decryption using partitioning, zigzag and swapping.

References

[1] X. Zhang, “Reversible data hiding in encrypted images,”IEEE Signal Process. Lett. vol. 18, no. 4, pp. 255–258, Apr. 2011.

[2] Pramod R Sonawane, K.B .Chaudhari ,“Reversible image watermarking using adaptive prediction error expansion and pixel selection” International Journal Of Engineering Science And Innovative Technology (Ijesit) , Volume 2, Issue 2, March 2013.

[3] Tausif Anwar, Dr. Sanshita Paul and Shailendra Kumar Singh, “Message Transmission Based on DNA Cryptography: Review”, International Journal of Bio – Science and Bio – Technology, Vol. 6, Issue 5, pp. 215 - 222, 2014.

[4] N. Memon and P. W. Wong, 2001, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649.

[5] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Information Hiding- a survey”, Proceeding of the IEEE, special issue on protection of multimedia content, pp. 1062-1078, July 1990.

[6] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in color and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, Oct. /Dec. 2001.

[7] R.Anderson and F. Petitcolas, ”On the limits of steganography” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4,May 1998.

[8] Niels Provos, Peter Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE computer society, 2003.

[9] Chi-Kwong Chan, L.M. Cheng ,“Hiding data in images by simple LSB substitution”, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong Received 17 May 2002.

[10] B. Li, J. He, J. Huang and Y. Q. Shi, “A survey on image Steganography and steganalysis”, Journal of Information Hiding and Multimedia Signal Processing, 2011.

[11] A. Kumar, S. Kumari, S. Patro, T. Sh and A. K. Acharya, “Image Steganography using Index based Chaotic Mapping”, In IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT, pp.1-4,2015

[12] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques”, International Conference on Image Processing, IEEE, 2001.

[13] D. V. Ramana and P. N. Rao, “Steganography Algorithms for Image Security Using LSB Substitution Method”, International Journal of Modern Embedded System, 2016.

[14] A. A. Attaby, M. F. M. Ahmed and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3”, Ain Shams Engineering Journal, 2017.

[15] Q. Kester, “A cryptographic Image Encryption technique based on the RGB PIXEL shuffling A cryptographic Image Encryption technique based on the RGB PIXEL shuffling”, International Journal of Advanced Research in Computer Engineering & Technology, vol. 2,no.2 pp.848-854, January 2013.

[16] P. Sahute, S. Waghamare, S. Patil, and A. Diwate, “ Secure Messaging Using Image Stegnography”, International Journal of Modern Trends in Engineering and Research,vol.2,no.3, pp. 598–608, March 2015.

[17] Jassim, Firas A., "A novel Steganography algorithm for hiding text in image using five modulus method", arXiv preprint arXiv, Vol. 72, No.17, PP. 39-44, 2013.

[18] Krati Vyas, B.L.Pal, "A proposed method in image steganography to improve image quality with lsb technique", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 1, PP. 5246-5251, 2014.

[19] Bandyopadhyay, Debiprasad, et al., "A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 3, No. 1, PP. 11-22, 2014.

[20] Thiyagarajan, P., G. Aghila, and V. Prasanna Venkatesan., "Stego-Image Generator (SIG)-Building Steganography Image Database", Advances in Digital Image Processing and Information Technology Springer Berlin Heidelberg, PP. 257-267, 2011.

Downloads

Published

2025-11-25

How to Cite

[1]
Y. Gyarsia and S. Tiwari, “Steganography With Improved Cryptography”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 162–166, Nov. 2025.