Open Access Open Access  Restricted Access Subscription or Fee Access

Securing Information using Cryptography and Steganography Technique

V. Hemanth, Mahammad Shareef

Abstract


Present day’s communication became the one of themajor criteria for a human being. While communication theinformation should be send in such a way that the third part or anunauthorized user should not be able to know what the parties arecommunicating. For this, Internet is the source of communication. InInternet the data will be transferred in covert channel. Here it will bedifficult to provide security for the channel, so the security isprovided for the information than the channel. Now the task is toprovide the security to the information. Cryptography andsteganography are the techniques used to convert the secretinformation into an unreadable format and this data can be embeddedinto an image respectively. By using only cryptography the intrudercan get back the original message if the key is known, to avoid this,by introducing Steganography over cryptography the secret messagecannot be straightforwardly decrypted because, the data is embeddinginto a cover image, Nemours techniques are available in which LeastSignificant Bit insertion is one of the best techniques because itproduces less noise in stego-image when compared to othertechniques. Using Diffie Hellman algorithm the data is encrypted


Keywords


Steganography, Cryptography, Information Hiding,Least Significant Bit Insertion, Diffie Hellman, Pseudo Random Number generator (PRNG).

Full Text:

PDF

References


V Hemanth, Mahammad Shareef, “ Hidding information in an imageusing a novel LSB technique”, National conference on Advances incomputing and Technology (NCACT-2013), 15th March 2013.

Prof. Samir Kumar Bandyopadhyay, Indra Kanta Maitra, “AnApplication of Palette Based Steganography”, International Journal ofComputer Applications, (0975 – 8887) Volume 6– No.4, September2010

G. Kessler. “An Overview of Cryptography”. Internet:

http://www.garykessler.net/library/crypto.html. May 1998 [March 21,2011].

P. Marwaha and P. Marwaha, “Visual Cryptographic Steganography inImages”, in Proc. ICCCNT, 2010, pp. 1-6.

NIELS PROVOS AND PETER HONEYMAN, “Hide and Seek: AnIntroduction to Steganography”, IEEE SECURITY & PRIVACY, 1540-7993, 2003.

C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computers andGraphics, vol. 26, no. 5, pp. 765–770, 2002.

H. Motameni, M. Norouzi, M. Jahandar, and A. Hatami, “LabelingMethod in Steganography”, World Academy of Science, Engineeringand Technology 30, 2007.

Venkatraman.S, Ajith Abraham, MarcinPaprzycki, “Significance of

Steganography on Data Security”, ITCC’04, 2004 IEEE.

Diffie Hellman (Algorithm) from Wikipedia,

http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange.

Randall J. Easter , Carolyn French , “Annex C: Approved RandomNumber Generators for FIPS PUB 140-2, Security Requirements forCryptographic Modules“, http://csrc.nist.gov/publications/fips/fips1 40

/fips1402annexc.pdf February 16, 2012 Draft

B. Li, J. He, J. Huang and Y. Q. Shi, “A Survey on Image

Steganography and Steganalysis”, Journal of Information Hiding andMultimedia Signal Processing, Vol. 2, No. 2, pp. 142-172, April, 2011,ISSN 2073-4212.

S. Song, J. Zhang, X. Liao, J. Du and Q. Wen, “A Novel SecureCommunication Protocol Combining Steganography and

Cryptography”, Elsevier Inc, Advanced in Control Engineering andInformation Science, Vol. 15, pp. 2767 – 2772, 2011.

R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, 2ndedition, Prentice Hall, Inc, 2002.

J. Fridrich, R. Du and I. Meng, “Steganalysis of LSB encoding in colorimages”, Proc. of IEEE Conference on Multimedia and Expo, July 31-August 2, 2000.

T.Zhang and X.Ping, “Reliable detection of LSB steganography basedon the difference image histogram”, IEEE International Conference onAcoustics, Speech, and Signal Processing, vol. 3, pp.545-548 April2003.

J. Mielikainen, LSB matching revisted, IEEE Signal Processing Letters,vol. 13, no. 5, pp. 285-287, 2006.

P.R.S.S.V. Raju, Y. Vamsidhar and R.C. Sriram, “Edge adaptive imagesteganography on LSB using Godel numbering”, IJCST, vol. 2, no. 1,December 2011 (Online).

Blum Blum Shub from Wikipedia,

http://en.wikipedia.org/wiki/Blum_Blum_S hub last modified on 28March 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.