Open Access   Article Go Back

Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography

Anirban Bhowmick1 , Vishal Kapur2 , Surya Teja Paladi3

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-3 , Page no. 7-12, Mar-2015

Online published on Mar 31, 2015

Copyright © Anirban Bhowmick, Vishal Kapur , Surya Teja Paladi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anirban Bhowmick, Vishal Kapur , Surya Teja Paladi, “Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.7-12, 2015.

MLA Style Citation: Anirban Bhowmick, Vishal Kapur , Surya Teja Paladi "Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography." International Journal of Computer Sciences and Engineering 3.3 (2015): 7-12.

APA Style Citation: Anirban Bhowmick, Vishal Kapur , Surya Teja Paladi, (2015). Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography. International Journal of Computer Sciences and Engineering, 3(3), 7-12.

BibTex Style Citation:
@article{Bhowmick_2015,
author = {Anirban Bhowmick, Vishal Kapur , Surya Teja Paladi},
title = {Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {7-12},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=411},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=411
TI - Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Anirban Bhowmick, Vishal Kapur , Surya Teja Paladi
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 7-12
IS - 3
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
3048 2583 downloads 2670 downloads
  
  
           

Abstract

With the mounting significance of data security over the network, steganography and cryptography are two emerging fields of research. Steganography is the technique in which confidential data is concealed in a cover medium. Cryptography is an approach of translating the personal data to some unintelligible form to keep it safe from intruders. Steganography and Cryptography attempt to accomplish identical objective of data security via different means. In this paper, the authors state a novel system to mask secret data. The confidential text is encrypted using modified Playfair cipher in the first step. In the second step, the cipher text is subjected to image steganography. In this step, the cipher text is embedded into the image using LSB encoding. To further enhance the concealment of the message, the image is subjected to a two-level simple but secure symmetric key encryption which comprises of two image encryption algorithms. These encryption algorithms use two pseudo random number generators that is Linear Congruential Generator and Blum Blum Shum algorithm.

Key-Words / Index Term

Modified Playfair cipher, Image Steganography, LSB encoding, Image Encryption, Linear Congruential Generator, Blum Blum Shub, Pseudo Random Number Generators

References

[1] Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi
[2] Derek Bruff, Ph.D, The Playfair Cipher Revealed Wynne MLAS 280-07 Cryptography July 13, 2009
[3] William Stallings,” Cryptography and Network Security”, 5th Edition
[4] Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya, P. Komuraiah, “An Extension to Traditional Playfair Cryptographic Method”, International Journal of Computer Applications (0975 – 8887)Volume 17– No.5, March 2011
[5] S. Das, B. Bandyopadhyay and S. Sanyal, “Steganography and Steganalysis: different approaches”, Cornell University Library, 2011
[6] Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications (09758887) Volume 1 – No. 15
[7] “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, National Institute of Standards and Technology, Special Publication 800-22 Revision 1a.
[8] An article on Linear Congruential Generator is available “http://en.wikipedia.org/wiki/Linear_congruential_generator”.
[9] Nishith Sinha, Anirban Bhowmick, Kishore B, “Encrypted Information Hiding using Audio Steganography and Audio Cryptography”, International Journal of Computer Applications (0975 – 8887) Volume 112 – No. 5, February 2015
[10] M U Bokhari, Shadab Alam, Faheem Syeed Masoodi, “Cryptanalysis techniques for Stream Cipher: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No 15, October 2014
[11] Andrew S Tanenbaum, “Computer Networks”, 4th Edition
[12] Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, “Image Steganography and Steganalysis: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 52– No.2, August 2012
[13] Shreenandan Kumar, Suman Kumari, Sucheta Patro, Tushar Shandilya, Anuja Kumar Acharya, “Image Steganography using Index based Chaotic Mapping”, International Journal of Computer Applications (0975 – 8887) International Conference on Distributed Computing and Internet Technology (ICDCIT-2015)
[14] Saurabh V. Joshi Ajinkya A. Bokil Nikhil A. Jain Deepali Koshti, “Image Steganography Combination of Spatial and Frequency Domain”, International Journal of Computer Applications (0975 – 8887) Volume 53– No.5, September 2012
[15] Nitin Kaul, Nikesh Bajaj, “Audio in Image Steganography based on Wavelet Transform”, International Journal of Computer Applications (0975 – 8887) Volume 79 – No3, October 2013
[16] Ajit Singh, Swati Malik, “Securing Data by Using Cryptography with Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 ISSN: 2277 128X
[17] Firas A. Jassim, “A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method”, International Journal of Computer Applications (0975 – 8887) Volume 72– No.17, June 2013
[18] Dipti Kapoor Sarmah, Neha Bajpai, “Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887)Volume 8– No.9, October 2010
[19] Unik Lokhande, A. K. Gulve, “Steganography using Cryptography and Pseudo Random Numbers”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.19, June 2014
[20] V. Lokeswara Reddy, B. Sailendar, “Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No 11, October 2014