IJMSC Vol. 8, No. 2, 8 Jun. 2022
Cover page and Table of Contents: PDF (size: 798KB)
PDF (798KB), PP.37-45
Views: 0 Downloads: 0
Steganography, cryptography, Data privacy, Data Security, Encryption
Data privacy is being breached occasionally whether in storage or in transmission. This is due to the spate of attack occasioned by the movement of data and information on an insecure internet. This study aimed to design a system that would be used by both sender and receiver of a secret message. The system used the combination of Steganography (MSB) and Cryptography (RSA) approaches to ensure data privacy protection. The system generates two keys: public and private keys, for the sender and receiver to encrypt and decrypt the message respectively. The steganography method used does not affect the size of cover image. The software was designed using python programming language in PyCharmIDE. The designed system enhanced the security and privacy of data. The results of this study reveal the effectiveness of combination of steganography and cryptography over the use of either cryptography or steganography and other existing systems.
Olawale Surajudeen Adebayo, Shefiu Olusegun Ganiyu, Fransic Bukie Osang, Salawu, Sule Ajiboye, Kasim Mustapha Olamilekan, Lateefah Abdulazeez," Data Privacy System Using Steganography and Cryptography ", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.8, No.2, pp. 37-45, 2022. DOI: 10.5815/ijmsc.2022.02.04
[1]J. S. Davis and O. A. Osoba, "Privacy Preservation in the Age of Big Data: A Survey", RAND Corporation, Santa Monica, Calif, vol. 2, no. 3, pp. 1–15, 2016.
[2]A. C. Oluwakemi, A. S. Kayode, and O. J. Ayotunde, "Efficient Data Hiding System using Cryptography and Steganography", International Journal of Applied Information Systems (IJAIS), vol. 4, no. 11, pp. 6–11, 2012.
[3]M. A. Alia and A. A. Yahya 2010, "Public – Key Steganography Based on Matching Method", European Journal of Scientific Research, vol. 40, no. 2, pp. 223–231, 2010.
[4]A. Singh and S. Malik, "Securing Data by Using Cryptography with Steganography", International Journal of Computer Network and Information Security (IJCNIS), vol. 3, no. 5, pp. 404–409, 2013.
[5]K. Patel, S. Utareja, and H. Gupta, "Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm", International Journal of Computer Applications, vol. 63, no. 13, pp. 24–28, 2013.
[6]G. Shailender, G. Ankur, and B. Bharat. "Information Hiding Using Least Significant Bit Steganography and Cryptography", International Journal of Computer Network and Information Security (IJCNIS), vol. 6, no. 27, pp. 27–34, 2012.
[7]A. Kolla, "List of 10 Best Steganography Tools to Hide Data", Geek Dashboard, 2017. [Online]. Available: https://www.geekdashboard.com/best-steganography-tools/. [Accessed: 06-Nov-2019].
[8]I. V. S. Manoj, "Cryptography and Steganography”, International Journal of Computer Applications, vol. 1, no. 12, pp. 63–68, 2010.
[9]A. Gosain, and N. Chugh, "Privacy Preservation in Big Data", International Journal of Computer Applications, vol. 100, no. 17, pp. 44–47, 2014.
[10]M. Ebrahim, S. Khan, and Bin Khalid U, "Symmetric Algorithm Survey?: A Comparative Analysis”, International Journal of Computer Applications, vol. 61, no. 20, pp. 12–19, 2013.
[11]J. French, Dacula, J. Wilder, and S. Hill, "System and method for authentication of network users and issuing a digital certificate", World Intellectual Property Organization, vol. 1, no. 12, pp. 1–52, 2001.
[12]R. D. Sari, A. Putera, and U. Siahaan, "Least Significant Bit Comparison between 1-bit and 2-bit Insertion Least Significant Bit Comparison between 1-bit and 2-bit Insertion”, INTERNATIONAL JOURNAL FOR INNOVATIVE RESEARCH IN MULTIDISCIPLINARY FIELD, vol. 4, no. 10, pp. 2–6, 2018.
[13]S. Karthik and A. Muruganandam, "Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System", International Journal of Scientific Engineering and Research (IJSER), vol. 2, no. 11, pp. 1–8, 2014.
[14]P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, "A Comprehensive Evaluation of Cryptographic Algorithms?: DES", Procedia - Procedia Comput. Sci., vol. 7, no. 3, pp. 617–624, 2016.
[15]P. Mahajan and A. Sachdeva, "A Study of Encryption Algorithms AES, DES and RSA for Security", Global Journal of Computer Science and Technology Network, Web & Security, vol. 13, no. 15, pp. 14–22, 2013.
[16]B. Pamavathi and S. R. Kumari, "A Survey on Performance Analysis of DES , AES and RSA Algorithm along with LSB Substitution Technique", International Journal of Science and Research (IJSR), vol. 2, no. 4, pp. 170–174, 2013.