Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach

Full Text (PDF, 759KB), PP.13-21

Views: 0 Downloads: 0

Author(s)

Aumreesh Kumar Saxena 1,* Sitesh Sinha 1 Piyush Shukla 2

1. CSE Dept, AISECT University Bhopal, MP, India

2. CSE Dept. UIT RGPV Bhopal, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2018.04.02

Received: 12 Jan. 2018 / Revised: 2 Feb. 2018 / Accepted: 24 Feb. 2018 / Published: 8 Apr. 2018

Index Terms

Security, Cryptography, Steganography, Symmetric Key, Encryption, Decryption, Wavelet Transform, Image Compression

Abstract

This paper proposes security technique for the confidential data which is the combination of three techniques, first is image compression that is based on wavelet transformation which will compress confidential image and reduce the size of the image, second is cryptography that is based on symmetric key which will encrypt the confidential image, and third is steganography that is based on least significant bit (LSB) which will embedded encrypted information inside a cover image. Therefore the purpose of the proposed technique is the high security and quality of the reconstructed cover image.

Cite This Paper

Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla," Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.10, No.4, pp. 13-21, 2018. DOI: 10.5815/ijigsp.2018.04.02

Reference

[1]G Prabakaran, R. Bhavani, P.S.   Rajeswari, “Multi secure and robustness for medical image based steganography scheme” International Conference on Circuits, Power and Computing Technologies (ICCPCT), Page(s): 1188 – 1193,  India 2013 ,

[2]N. Akhtar, ; P. Johri, ; S Khan, “Enhancing the Security and Quality of LSB Based Image Steganography” 5th International Conference on Computational Intelligence and Communication Networks (CICN),  Page(s): 385 – 390  India 2013 ,

[3]R.P Kumar, V. Hemanth, M  “Securing Information Using Sterganoraphy”International Conference on Circuits, Power and Computing Technologies (ICCPCT), Page(s): 1197 – 1200 India  2013,

[4]Ashwak M. AL-Abiachi, Faudziah Ahmad and Ku Ruhana “A Competitive Study of Cryptography Techniques over Block Cipher”  UKSim 13th IEEE International Conference on Modelling and Simulation Pages(s):415-419 UK 2011

[5]Seyed Hossein Kamali, Reza Shakerian, Maysam Hedayati, Mohsen Rahmani   “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption ”2010 IEEE International Conference on Electronics and Information Engineering (ICEIE 2010) Pages(s): V1-141-V1-145,  Japan 2010

[6]ZHANG Yun-peng, ZHAI Zheng-jun, LIU Wei, NIE Xuan, CAO Shui-ping, DAI Wei-di “Digital Image Encryption Algorithm Based on Chaos and Improved DES” ”Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics Page(s): 474-479, USA - 2009

[7]Jaeyoung Kim; Hanhoon Park; Jong-Il Park “Image  steganography  based  on  block  matching in DWT domain” IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Page(s):1 – 4, Italy-2017 

[8]Ismael Abdul Sattar; Methaq Talib Gaata Image steganography  technique  based  on  adaptive  random  key  generator with suitable cover selection” Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Page(s):208-212 Iraq- 2017

[9]Shivani Chauhan; Jyotsna; Janmejai Kumar; Amit Doegar “Multiple Layer Text security Using variable block size cryptography and image steganography” 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Page(s):1-7, India-2017

[10]Shubhi Mittal; Shivika Arora; Rachna Jain “PData security using RSA encryption combined with image steganography” 1st India International Conference on Information Processing (IICIP), Page(s):1-5, India-2016

[11]M. Saritha; Vishwanath M. Khadabadi; M. Sushravya “Image and text steganography with cryptography using MATLAB” International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)  page(s): 584-587, India-2016.

[12]Mamta Jain; Rishabh Charan Choudhary; Anil Kumar “Secure medical  image steganography with RSA cryptography usingdecision tree” 2nd International Conference on Contemporary Computing and Informatics (IC3I), Page(s):291-295, India- 2016

[13]Nikhil Patel; Shweta Meena “LSB based Image steganography using Dynamic key cryptography” 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), Pages(s): 1-5,India-2016

[14]Rupali Bhardwaj; Divya Khanna Enhanced the security of image steganography through image encryption” Annual IEEE Conference (INDICON), Page(s):1-4, India-2015

[15]Kalpana Sanjay Shete,  Mangal Patil and J. S. Chitode “Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA” MECS I.J. Image, Graphics and Signal Processing, Vol. 6, Pp-48-56, 2016

[16]T. Bhattacharya, N. Dey, and S.R.B. Chaudhuri, “A session based multiple image hiding technique using DWT and DCT,” International Journal of Computer Application (IJCA), vol. 38, no. 5, pp. 398–409, 2012.

[17]G V Chaitanya, D Vamsee Krishna, L Anjaneyulu “A 3-Level Secure Histogram Based Image Steganography Technique”  MECS I.J. Image, Graphics and Signal Processing, Vol. 4, Pp- 60-70,  2013 

[18]M.K Ramaiya. ; N.Hemrajani, ; , A.K Saxena. “Security improvisation in image steganography using DES” IEEE 3rd International on Advance Computing Conference (IACC),  Page(s): 1094 – 1099, India-2013

[19]S. Laskar, and K. Hemachandran, "High Capacity Data Hiding using LSB Steganography and Encryption",  International Journal of Database Management Systems ( IJDMS ) Vol. 4, No. 6, pp. 57-68, December 2012.