Steganography With Improved Cryptography
Keywords:
Image steganography, LSB, Cryptography, Symmetric Encryption, Block Cipher, SecurityAbstract
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption are the two main elements complementing each other. The steganography is the art of hidden; its main aim is to pass unnoticed data in another data. There are many types of data that used in steganography, such as message, image, and video. In this work, we are interested in hiding a message inside an image and also securing it. Our work focuses on the study of least significant bit (LSB) technique for embedding text into image. Moreover, we propose an improved approach for LSB based image steganography and encryption decryption using partitioning, zigzag and swapping.
References
[1] X. Zhang, “Reversible data hiding in encrypted images,”IEEE Signal Process. Lett. vol. 18, no. 4, pp. 255–258, Apr. 2011.
[2] Pramod R Sonawane, K.B .Chaudhari ,“Reversible image watermarking using adaptive prediction error expansion and pixel selection” International Journal Of Engineering Science And Innovative Technology (Ijesit) , Volume 2, Issue 2, March 2013.
[3] Tausif Anwar, Dr. Sanshita Paul and Shailendra Kumar Singh, “Message Transmission Based on DNA Cryptography: Review”, International Journal of Bio – Science and Bio – Technology, Vol. 6, Issue 5, pp. 215 - 222, 2014.
[4] N. Memon and P. W. Wong, 2001, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649.
[5] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Information Hiding- a survey”, Proceeding of the IEEE, special issue on protection of multimedia content, pp. 1062-1078, July 1990.
[6] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in color and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, Oct. /Dec. 2001.
[7] R.Anderson and F. Petitcolas, ”On the limits of steganography” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4,May 1998.
[8] Niels Provos, Peter Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE computer society, 2003.
[9] Chi-Kwong Chan, L.M. Cheng ,“Hiding data in images by simple LSB substitution”, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong Received 17 May 2002.
[10] B. Li, J. He, J. Huang and Y. Q. Shi, “A survey on image Steganography and steganalysis”, Journal of Information Hiding and Multimedia Signal Processing, 2011.
[11] A. Kumar, S. Kumari, S. Patro, T. Sh and A. K. Acharya, “Image Steganography using Index based Chaotic Mapping”, In IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT, pp.1-4,2015
[12] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques”, International Conference on Image Processing, IEEE, 2001.
[13] D. V. Ramana and P. N. Rao, “Steganography Algorithms for Image Security Using LSB Substitution Method”, International Journal of Modern Embedded System, 2016.
[14] A. A. Attaby, M. F. M. Ahmed and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3”, Ain Shams Engineering Journal, 2017.
[15] Q. Kester, “A cryptographic Image Encryption technique based on the RGB PIXEL shuffling A cryptographic Image Encryption technique based on the RGB PIXEL shuffling”, International Journal of Advanced Research in Computer Engineering & Technology, vol. 2,no.2 pp.848-854, January 2013.
[16] P. Sahute, S. Waghamare, S. Patil, and A. Diwate, “ Secure Messaging Using Image Stegnography”, International Journal of Modern Trends in Engineering and Research,vol.2,no.3, pp. 598–608, March 2015.
[17] Jassim, Firas A., "A novel Steganography algorithm for hiding text in image using five modulus method", arXiv preprint arXiv, Vol. 72, No.17, PP. 39-44, 2013.
[18] Krati Vyas, B.L.Pal, "A proposed method in image steganography to improve image quality with lsb technique", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 1, PP. 5246-5251, 2014.
[19] Bandyopadhyay, Debiprasad, et al., "A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 3, No. 1, PP. 11-22, 2014.
[20] Thiyagarajan, P., G. Aghila, and V. Prasanna Venkatesan., "Stego-Image Generator (SIG)-Building Steganography Image Database", Advances in Digital Image Processing and Information Technology Springer Berlin Heidelberg, PP. 257-267, 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
