Open Access Open Access  Restricted Access Subscription or Fee Access

Data Hiding into Images with Encryption Using Steganography

D. Pratheep Raja, R. Sankar

Abstract


In this paper RSA algorithm is used for encryption of data that can be invoked with the steganography method .the data can be embedded into the images by the LSB algorithm in steganography. The RSA algorithm is used in modern computer for encryption and decryption. The RSA algorithm encryption done by two keys called symmetric and asymmetric key. Which provide high security in the steganography method. The LSB algorithm is the used for bit wise encryption of cipher text into steganography image. This method provide high security to the sensitive data over the communication between the source and destination. The hidden data is called invisible data that only accessed by the authorized person.


Keywords


Encryption, Keys, Security, Steganography

Full Text:

PDF

References


Sencar H, Velastin S, Nikolaidis N, and et al., Intelligent Multimedia Analysis for Security Applications, Springer Publisher, 2010.

Lian S and Zhang Y, Handbook of Research on Secure Multimedia Distribution, IGI Global (formerly Idea Group, Inc), March 2009.

Lian S and Zhang Y, “Multimedia forensics for detecting forgeries”, in Handbook on Communications and Information Security, Springer, 2010, pp. 801-820.

Mamta Juneja, Parvinder S. Sandhu, Ekta Walia,"Application of LSB Based Steganographic Technique for 8-bit Color Images", World Academy of Science, Engineering and Technology, 2009.

Whitfield Diffie and Martin E. Hellman, "New Directions in Cryptography", IEEE International Symposium on Information Theory on 1976, Ronneby, Sweden.

Chandra M. Kota and Cherif Aissi1, "Implementation of the RSA algorithm and its cryptanalysis", ASEE Gulf Southwest Annual Conference on 2002, Houston, USA.

Mamta Juneja, Parvinder S. Sandhu, Ekta Walia,"Application of LSB Based Steganographic Technique for 8-bit Color Images", World Academy of Science, Engineering and Technology, 2009.

M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image watermarking,” in Proc. Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 111, pp. 211–214.

K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image,” in Proc. IEEE Military Communications Conf., Monterey, CA, 1990, pp. 216–220.

P.Davern and M. Scott, “Fractal based image steganography,” in Information Hiding, First International Workshop, Lecture Notes in Computer Science, R. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996,vol. 1174, pp. 279–294.

M. D. Swanson, B. Zhu, and A. H. Tewfik, “Robust data hiding for images,” in Proc. IEEE Digital Signal Processing Workshop, Loen, Norway, Sept. 1996, pp. 37–40.

Colm Mulcahy Ph. D, "Image Compression using Haar Wavelet Transform", Spelman Science and Math Journal, 22-31.

V. K. Chonev, “Improved steganographic embedding using feature restoration,” Oxford Univ. Comput. Lab., Oxford, U.K., Tech. Rep., 2010.

A. Kumar, and M. K. Ghose, ―Extended substitution-diffusion based image cipher using chaotic standard map," Communications in Nonlinear Science and Numerical Simulation, vol. 16, pp. 372-382, 2011.

S. Gandharba, and S.K. Lenka, ―LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits, ǁ Springer, Proceedings of 4th International Conference, Obcom 2011, CCIS (ISBN: 978-3-642-29216-3), vol. 2, no. 270, pp.479-488, 2012.

J. Fridrich, M. Goljan, and R. Du, Reliable detection of lsb steganography in color and grayscale images," Proceedings of The International Conference on Multimedia and Security: New Challenges, pp. 27{30, 2001.

H. Gupta, A. P. R. Kumar, and S. Changlani, Steganography using lsb bit substitution for data hiding," International Journal of Advanced Research in Computer Science and Electronics Engineering, vol. 2, no. 10, pp. 676{680, 2013.

C. Jianping and U. Jauhari, Analysis on regular- singular steganalysis algorithm for multimedia," International Journal of Network Security, Vol.19, No.3, PP.327-334, May 2017 (DOI: 10.6633/IJNS.201703.19 (3).01) 334 Journal of Network & Information Security, vol. 4,no. 4, pp. 395{403, 2013.

N. Sathisha, G. N. Madhusudan, S. Bharathesh, K. B. Suresh, K. B. Raja and K. R. Venugopal, "Chaos based Spatial Domain Steganography using MSB", International Conference on Industrial and Information Systems(ICIIS), pp. 177-182, 2010.

V. Holub and J. J. Fridrich, “Designing steganographic distortion using directional filters,” in Proc. IEEE Workshop Inf. Forensic Security, Aug. 2012, pp. 234–239.

N. Pavani, B. Sarala, “ Secure Data Communication using Cryptography and Steganography Standards” International Journal of Emerging Engineering Research and Technology 2015

Mohammed Salem Atoum and Mohammed M. Abu Shquier, “A Various Issues in Image Steganography that Using LSB Technique”. International Journal of Computer Networks and Communications Security 2015

Amba Mishra, PrashantJohri, “A Review on Video Steganography using GA”. IJIACS 2015.

Anuradha Singhal, Punam Bedi,” Local Binary Pattern Operator based Steganography in Wavelet Domain”, ICACCI 2016 IEEE, pp 826-831.

Yash Kumar Singh, Sudhanshu Sharma “Image Steganography on Gray and Color Image using DCT Enhancement and RSA with LSB Method” International Conference on Inventive Computation Technologies (ICICT) 2016.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.