A Novel Security Scheme for Secret Data using Cryptography and Steganography

Full Text (PDF, 183KB), PP.36-42

Views: 0 Downloads: 0

Author(s)

Phad Vitthal S. 1,* Bhosale Rajkumar S. 1 Panhalkar Archana R. 1

1. Department of Computer Engineering, Pravara Rural Engg. College, Loni, M.S., India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.02.06

Received: 9 Aug. 2011 / Revised: 6 Nov. 2011 / Accepted: 23 Dec. 2011 / Published: 8 Mar. 2012

Index Terms

Cryptography, Advance encryption standard (AES), Steganography, Pixel-value differencing (PVD), Least-significant-bit (LSB) substitution

Abstract

With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of the most significant problems for distributing new information technology. It is necessary to protect this information while communicated over insecure channels. Thus, a need exists for developing technology that will help protect the integrity of digital content and secure the intellectual property rights of owners. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. In this proposed system we developed high security model by combining cryptographic and Steganographic security. In cryptography we are using advanced encryption standard (AES) algorithm to encrypt secret message and then pixel value differencing (PVD) with K-bit least-significant-bit (LSB) substitution is used to hide encrypted message into truecolor RGB image. Our proposed model gives two tier security to secret data. Further our proposed method gives high embedding capacity and high quality stego images.

Cite This Paper

Phad Vitthal S., Bhosale Rajkumar S., Panhalkar Archana R., "A Novel Security Scheme for Secret Data using Cryptography and Steganography", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.2, pp.36-42, 2012. DOI:10.5815/ijcnis.2012.02.06

Reference

[1]Menezes, Alfred , Paul C van Oorschot ,Scott A. Vanstone, “ Handbook of Applied Cryptography. CRC Press”, October 1996 , ISBN 0-8493-8523-7.
[2]William Stallings, “Cryptography and Network Security: Principles and practices”, Pearson education, Third Edition, ISBN 81-7808-902-5.
[3]N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security and Privacy Mag.”, 2003, vol. 1, no. 3, pp. 32–44,.
[4]C. K. Chan and L. M. Chen, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004.
[5]R. R. Anderson and F. A. P. Peticolas, “On the limits steganography,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474–481, May 1998.
[6]Joan Daemen, Vincent Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard." in Springer, 2002 ,ISBN 3-540-42580-2.
[7]Christof Paar, Jan Pelzl, "The Advanced Encryption Standard" Textbook for Students and Practitioners.
[8]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang , Hun Min Sun ,”Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems”, in IEEE Information Transactions On Forensics And Security, September 2008 , Vol. 3, No. 3.
[9]D. W. Bender, N. M. Gruhl, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, pp. 313–316, 1996.
[10]Data Encryption Standard (DES)’.National Bureau of Standards (US).Federal Information Processing Standards Publication National Technical Information Service. Springfield VA. April 1997.
[11]D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognit. Lett., vol. 24, no. 9–10, pp. 1613–1626, 2003.
[12]H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Proc. Inst. Elect. Eng., Vis. Image Signal Process., vol. 152, no. 5, pp. 611–615, 2005.
[13]Rafael C. Gonzalz and Richard E. Woods, “Digital Image Processing”, Pearsion Education, Second Edition, ISBN 81-7758-168-6.
[14]Rafael C. Gonzalz, Richard E. Woods and Steven L. Eddins, “Digital ImageProcessingUsing MATLAB”, Pearson Education, First Indian Reprint 2004, ISBN 81-297-0515-X.
[15]Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
[16]Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston. London, 2000.
[17]Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999
[18]Dunbar, B., “Steganography techniques and their use in an Open-Systems environment”, SANS Institute, January 2002
[19]Bender, W., Gruhl, D., Morimoto, N. & Lu, A., “Techniques for data hiding”, IBM Systems Journal, Vol 35, 1996