Open Access Open Access  Restricted Access Subscription or Fee Access

Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography

R. Bala

Abstract


Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for information security. Internet has also become an active field of crackers and intruders. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet. Here we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. In this new approach, encrypt the original text message letter by letter applying a function, which involves certain mathematical operation using corresponding letters and also numbers from the original image, and then we use highly secure encryption using Double - EHDES algorithm to encrypt the message. For encryption we need to use secret key for plain text M and Triple - EHDES encryption function. A new steganography approach for data hiding is proposed. This approach uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation of the hidden data is used to overwrite the LSB of each byte within the encrypted image randomly.

Keywords


Cryptography, Steganography.

Full Text:

PDF

References


Alain C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East CarolinaUniversity,http://www.infosecwriters.com/text_resources/pdf/steganographyDTEC6823.pdf

Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography, IEEE Security and Privacy, Volume 1 , Issue 3 (May 2003).

Jessica Fridrich and Miroslav Goljan, Digital image steganography using stochastic modulation, Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY, USA.

Swarnendu Mukherjee & Bhattacharya, Amlan Chaudhury Triple Layer Data Security ACM Ubiquity, Volume 9, Issue 17, 2008.

William Stalling, “Cryptography and Network Security-Principles and Practices”, fourth edition, Pearson Prentice Hall pf India P.Ltd.

Hempstalk, K.: Hiding behind corners: using edges in images for better steganography. Computing Womens Congress Conference, Hamilton, New Zealand, 2006.

Fridrich, J., Goljan, M. and Du, R.: Reliable detection of LSB steganography in color and grayscale images. Proc. ACM Workshop on Multimedia and Security, Ottawa, ON, Canada.

C.C. Chang, M.H. Lin, and Y.C. Hu, “A fast and secure image hiding scheme based on LSB substitution,” International J. of Pattern Recognition and AI, vol.16, no.4, 2002.

Van Dijk, M. and Willems, Embedding information in grayscale images. Proc. 22nd Symposium on Information and Communication Theory in the Benelux, pp. 147-154, Enschede, The Netherlands, May 15-16, 2001.

Goljan, M. and Holotyak, T.: New blind steganalysis and its implications. Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.