Open Access   Article Go Back

Steganography With Improved Cryptography

Yogesh Gyarsia1 , Shiv Tiwari2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-10 , Page no. 162-166, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si10.162166

Online published on May 05, 2019

Copyright © Yogesh Gyarsia, Shiv Tiwari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Yogesh Gyarsia, Shiv Tiwari, “Steganography With Improved Cryptography,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.10, pp.162-166, 2019.

MLA Style Citation: Yogesh Gyarsia, Shiv Tiwari "Steganography With Improved Cryptography." International Journal of Computer Sciences and Engineering 07.10 (2019): 162-166.

APA Style Citation: Yogesh Gyarsia, Shiv Tiwari, (2019). Steganography With Improved Cryptography. International Journal of Computer Sciences and Engineering, 07(10), 162-166.

BibTex Style Citation:
@article{Gyarsia_2019,
author = {Yogesh Gyarsia, Shiv Tiwari},
title = {Steganography With Improved Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {10},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {162-166},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=995},
doi = {https://doi.org/10.26438/ijcse/v7i10.162166}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.162166}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=995
TI - Steganography With Improved Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Yogesh Gyarsia, Shiv Tiwari
PY - 2019
DA - 2019/05/05
PB - IJCSE, Indore, INDIA
SP - 162-166
IS - 10
VL - 07
SN - 2347-2693
ER -

           

Abstract

With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption are the two main elements complementing each other. The steganography is the art of hidden; its main aim is to pass unnoticed data in another data. There are many types of data that used in steganography, such as message, image, and video. In this work, we are interested in hiding a message inside an image and also securing it. Our work focuses on the study of least significant bit (LSB) technique for embedding text into image. Moreover, we propose an improved approach for LSB based image steganography and encryption decryption using partitioning, zigzag and swapping.

Key-Words / Index Term

Image steganography, LSB, Cryptography, Symmetric Encryption, Block Cipher, Security

References

[1] . X. Zhang, “Reversible data hiding in encrypted images,”IEEE Signal Process. Lett. vol. 18, no. 4, pp. 255–258, Apr. 2011.
[2] Pramod R Sonawane, K.B .Chaudhari ,“Reversible image watermarking using adaptive prediction error expansion and pixel selection” International Journal Of Engineering Science And Innovative Technology (Ijesit) , Volume 2, Issue 2, March 2013.
[3] Tausif Anwar, Dr. Sanshita Paul and Shailendra Kumar Singh, “Message Transmission Based on DNA Cryptography: Review”, International Journal of Bio – Science and Bio – Technology, Vol. 6, Issue 5, pp. 215 - 222, 2014.
[4] N. Memon and P. W. Wong, 2001, “A buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649.
[5] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Information Hiding- a survey”, Proceeding of the IEEE, special issue on protection of multimedia content, pp. 1062-1078, July 1990.
[6] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in color and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, Oct. /Dec. 2001.
[7] R.Anderson and F. Petitcolas, ”On the limits of steganography” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4,May 1998.
[8] Niels Provos, Peter Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE computer society, 2003.
[9] Chi-Kwong Chan, L.M. Cheng ,“Hiding data in images by simple LSB substitution”, Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong Received 17 May 2002.
[10] B. Li, J. He, J. Huang and Y. Q. Shi, “A survey on image Steganography and steganalysis”, Journal of Information Hiding and Multimedia Signal Processing, 2011.
[11] A. Kumar, S. Kumari, S. Patro, T. Sh and A. K. Acharya, “Image Steganography using Index based Chaotic Mapping”, In IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT, pp.1-4,2015
[12] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques”, International Conference on Image Processing, IEEE, 2001.
[13] D. V. Ramana and P. N. Rao, “Steganography Algorithms for Image Security Using LSB Substitution Method”, International Journal of Modern Embedded System, 2016.
[14] A. A. Attaby, M. F. M. Ahmed and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3”, Ain Shams Engineering Journal, 2017.
[15] Q. Kester, “A cryptographic Image Encryption technique based on the RGB PIXEL shuffling A cryptographic Image Encryption technique based on the RGB PIXEL shuffling”, International Journal of Advanced Research in Computer Engineering & Technology, vol. 2,no.2 pp.848-854, January 2013.
[16] P. Sahute, S. Waghamare, S. Patil, and A. Diwate, “ Secure Messaging Using Image Stegnography”, International Journal of Modern Trends in Engineering and Research,vol.2,no.3, pp. 598–608, March 2015.
[17] Jassim, Firas A., "A novel Steganography algorithm for hiding text in image using five modulus method", arXiv preprint arXiv, Vol. 72, No.17, PP. 39-44, 2013.
[18] Krati Vyas, B.L.Pal, "A proposed method in image steganography to improve image quality with lsb technique", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 1, PP. 5246-5251, 2014.
[19] Bandyopadhyay, Debiprasad, et al., "A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 3, No. 1, PP. 11-22, 2014.
[20] Thiyagarajan, P., G. Aghila, and V. Prasanna Venkatesan., "Stego-Image Generator (SIG)-Building Steganography Image Database", Advances in Digital Image Processing and Information Technology Springer Berlin Heidelberg, PP. 257-267, 2011.