Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Image Steganography Combined with DES Encryption

K. Veeramanikandan, P. Manjamadevi, K. Latha

Abstract


Keeping in mind the end goal to enhance the security of steganography, this paper concentrated on picture steganography joined with pre-handling of DES encryption. At the point when transmitting the mystery data, firstly, scramble the data expected to cover up by DES encryption is encoded, and after that is composed in the picture through the LSB steganography. Encryption calculation enhances the least coordinating execution between the picture and the qualities of the mystery data to upgrade the opposition to recognition of the picture steganography. The exploratory results demonstrated that the opposition to identification vigor of picture steganography joined with pre-preparing of DES encryption is discovered vastly improved than the way utilizing LSB steganography calculations specifically.


Keywords


Information Hiding, Steganography, DES Encryption, High Security.

Full Text:

PDF

References


. Roszizti Ibrahim Teoh Suk Kuan.Steganography Aglorithm toHide Secret Message inside an Image [J]. Technology and Application of Compute: English, 2011, 2(2), 102-108

. Der-Chyuna Lou, Chen-Hao Hu,LSB steganogrpahic method based on reversible histogram transformation function for resisting statistical steganalysis[J], Information Sciences,2012, 188:346-358.

. Yifeng Sun,Fenlin Liu, Selecting cover for image steganography by correlation coefficient [C] ,2010 Second International Workshop on Educaton Technology and Computer Science, 159-162.

. Marwaha, P.,Visual cryptographic steganogrpahy in images[C], Computer Communication and Networking Technologies(ICCCNT),2010 International Conference 2010:1-6.

. Huanguo ZhangˈXiutao FengˈZhongpin TanˈYuzhen Liuˈ Evolutionary cryptosystems and evolutionary design for DES [J], JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONSˈ2002ˈ23(5)˖57-64.

. C.Cachin, “an information-theoretic model steganography,” in IH98, LNCS 1525, Heidelberg: Springer- Verlag, 1998˖306-318.

. Fridrich J, Goljan M, Du R, Detecting lsb steganography in color and gray-images[C],IEEE Multimedia Special Issue on Security, 2001:22-23.

. A.Westfeld, A, Pfitzmann, Attacks on steganographyic system, Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, 1999:61-76

. Manoj Kumar Ramaiya, Naveen Hemrajani, Anil Kishor Saxena, “Security Improvisation in image Steganography using DES”,3rd IEEE Trans. International Conference IACC -2013, Page(s): 1094 – 1099.

. Federal Information Processing Standared Publication (FIPS 197), “Advance Encryption Standard (AES) “, 26 Nov. 2001.

. Yambin Jina Chanu, Themrichon Tuithung, Kh Manglem singh,“ A Short Survey on Image Steganography and Steganalysis Technique “, IEEE Trans. ,2012 .

. Ge Huayong, Huang Mingsheng, Wang Qian, "Steganography and Steganalysis Based on Digital Image", IEEE Trans. International Congress on Image and Signal Processing,(2011) 252-255.

. Guilliang Zhu, Weiping Wang, “Digital Image Encryption algorithm based on pixel”, ICIS – 2010 IEEE International Conference 29-31 Oct 2010, pp – 769 – 772.

. Jasmin Cosic, Miroslav Bacai, “ Steganography and Steganalysis Does Local web Site contain “Stego” Contain“, 52 th IEEE Trans. International Symposium ELMAR-2010, Zadar, Croatia 2009 , pp 85 – 88.

. Zhang Yun-peng , Liu Wei “ Digital Image Encryption Algorithm Based on chaos and improved DES “, System, man and Cybernatics ,SMC 2009 , IEEE International Conference 11-14 Oct 2009, pp 474-479.

. N Provos and P. Honeyman, "Hide and seek: An Introduction to Steganography", IEEE Security and Privacy, 2003, pp32-44.

. Donovan Artz " Digital Steganography: Hiding Data within Data ", Los Alamos National Laboratory, IEEE Trans. 2001, pp 75-80.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.