Literature Review on Improving Data Security using DES and DCT
DOI:
https://doi.org/10.26438/ijcse/v9i7.7883Keywords:
LSB, DCT, DES, Stego ImageAbstract
Steganography is the art and science for hiding information by embedding data into cover media. Image processing in steganography is done mainly by using spatial domain and frequency domain. In this review literature, hiding spatial domain using LSB technique and hiding frequency domain using DCT technique is studied and compared. BMP cover images with 256x256 and 512x512 resolutions for LSB and DCT techniques are used for experimental study. For DCT technique, various BMP image is converted to JPEG image. The DCT technique is used to hide the data into the JPEG cover image. The resultant stego image obtained in JPEG is converted to BMP stego image. Thereafter, the comparison tool PSNR is used to compare the BMP images obtained from LSB and DCT. The data security and privacy play an important role for data transmission for exchanging information over internet. The two techniques like; cryptography and steganography both are pillars to be utilized for securing digital data by using different methods specifically DES (Data Encryption Standard) and DCT (Discrete Cosine Transform). The mixture of DES and DCT improves the digital data security with multiple level of security for encryption process which shows better results. In this research, we analyze the combination of cryptographic method with DES technique and stenographic method with DCT technique to develop a framework for digital data security environment. This paper also presents a proposed least significant bit (LSB) based framework for DES and DCT to secure digital data with better compression approach.
References
[1] Anderson, R. J., & Petitcolas, F. A., On the limits of steganography.Selected Areas in Communications, IEEE Journal on, 16(4), 474- 481, 1998.
[2] Anderson, R., Stretching the limits of steganography. In Information Hiding. Springer Berlin Heidelberg, pp. 39-48, 1996, January.
[3] Amin, M. M., Salleh, M., Ibrahim, S., Katmin, M. R., & Shamsuddin, M. Z. I. Information hiding using steganography. InTelecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on, pp. 21- 25, 2003, January. IEEE.
[4] Saraswat, P. K., & Gupta, D. R., A Review of Digital Image Steganography. Journal of Pure and Applied Science & Technology Copyright, 2(1), 98-106, 2011.
[5] General model of today’s Steganography. Retrieved on December 8, 2013 from: http://www.datahide.com
[6] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P., Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752, 2010.
[7] Hemalatha, S., Acharya, U. D., Renuka, A., & Kamath, P. R., A secure and high capacity image steganography technique. Signal & Image Processing: An International Journal (SIPIJ) Vol, 4, 83-89, 2013.
[8] Kaur, R., & Singh, B., Survey and Analysis of Various Steganography Techniques. International Journal of Computer Science and Advanced Technology, 6(3), 561 – 566, 2012.
[9] Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M., Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187, 2012.
[10] Rouse, M. (2010). Retrieved on December 19, 2013, from: http://whatis.techtarget.com
[11] Tiwari, N., & Shandilya, D. M., Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications, 0975–8887, 2010.
[12] Grantham, B., “Bitmap Steganography: An Introduction”, 2007.
[13] Fridrich, J., Goljan, M., & Hogea, D., Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding, Springer Berlin Heidelberg. pp.310-323, 2003, January.
[14] Provos, N., & Honeyman, P., Hide and seek: An introduction to steganography. Security & Privacy, IEEE, 1(3), 32-44, 2003.
[15] Jókay, M., & Morav?ík, T, Image-based JPEG steganography. Tatra Mountains Mathematical Publications, 45(1), 65-74, 2010.
[16] Morkel, T., Eloff, J. H., & Olivier, M.S., An overview of image steganography. In ISSA, pp. 1-11, 2005, June.
[17] Wang, S.J., Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation, 164(1), 99-116, 2005.
[18] Hariri, M., Karimi, R., & Nosrati, M., An introduction to steganography methods. World Applied Programming, 1(3),191-195, 2011.
[19] Joshi, R., Gagnani, L., & Pandey, S., Image Steganography With LSB.International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), pp-228, 2013.
[20] Sutaone, M. S., & Khandare, M.V., Image based steganography using LSB insertion technique. In Wireless, Mobile and Multimedia Networks, 2008. IET International Conference on, pp. 146-151, 2008 January. IET.
[21] Sravanthi, M. G., Devi, M. B. S., Riyazoddin, S. M., & Reddy, M.J., A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method. Global Journal of Computer Science and Technology Graphics & Vision, 12 (15), 2012.
[22] Gupta, M., & Garg, A.K., Analysis of Image Compression Algorithm Using DCT. International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, 515-521, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
