Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2016, International Journal of Modern Trends in Engineering & Research
This project focuses on designing a system in order to secure information form attacker using two security layers: 1.Cryptography 2.Steganography.This is an approach taken to enhance the security which will not be easy to break. The cryptographic algorithms which are commonly in use are RSA and AES. AES is the new standard after DES (the previous encryption standard); AES is a symmetric algorithm and nowadays it is widely used to encrypt and send data via internet, however for ultimate security we are combining both cryptography and steganography in one system. Our propose is to provide a high level of cracking complexity naturally it will result security enhancement.
TJPRC, 2013
Today’s cyber world is growing rapidly over Internet technologies & its applications needing high level of safeguard for expensive data during transmission over the open communication channel. Image steganography is a technique for hiding information into a cover image. Least Significant-Bit (LSB) replacement based method is most common steganographic technique in spatial domain owing to its simplicity and hiding capacity. Most of existing approaches focus on the embedding strategy with less consideration to the pre-processing such as encryption of secrete image. The conventional steganography algorithm does not provide the preprocessing required in image for better security and privacy. The proposed work presents an exclusive technique for Image steganography based on the Advance Encryption Standard (AES) using 128 bit block size of plaintext & 128 bits of Secrete key. The preprocessing provide high level of security as extraction of image is not possible without the knowledge of mapping rules of AES and secrete key .
The objective of image processing is to extract important information from images. The information can be in images or some vital data which can useful for further computing and analysis. In this paper a technique is evolved for encrypting the plain text multiple times. The ASCII codes(0-255) for the text information is utilized and even if intruder applies the brute force method for any attack, then he/she must have to exercise a trail for 256! times which is quite absurd. Moreover, the multiple encryption method makes the system further secured. This paper focuses on a technique that would offer better and secured technique to enable secret data transmission for commercial financial transactions using steganography and AES algorithm.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology , 2019
Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.
International Journal of Innovative Research in Science, Engineering and Technology, 2014
The data like username, password, and others will be hacked by the hackers and they can abuse the same. This issue can be comprehended typically by utilizing encryption and decryption algorithms. Encryption is a procedure of changing over clear secret data into indiscernible structure (Cipher Text). Decryption is a methodology of changing over the mixed up cipher text into decipherable structure. Both sender of the data and the beneficiary of the data utilizes same key for encrypting and decrypting. Yet the encryption and decryption algorithms have not given 100% security. The reason is that the hackers effortlessly will discover the key by catching the packets and breaking down the jaunty text utilizing different software and fittings. So we need an alternate way like steganography for hiding sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography.
International Journal of Advanced Computer Science and Applications, 2016
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known. According to the work in this paper, a merged technique for data security has been proposed using Cryptography and Steganography techniques to improve the security of the information. Firstly, the Advanced Encryption Standard (AES) algorithm has been modified and used to encrypt the secret message. Secondly, the encrypted message has been hidden using method in [1]. Therefore, two levels of security have been provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high quality stego images.
International Journal of Advanced Trends in Computer Science and Engineering , 2021
The transmission of information through any channel of correspondence needs solid encryption procedures with the end goal of information security. The computerized watermarking assumes a significant part in inserting data into an advanced picture signal, for the check and character of its proprietors. In discrete wavelet change, "investigation channel bank" can be utilized for dissecting picture signals by going through. The channel bank comprises high and low pass channels at every deterioration stage. In this paper, a technique to consolidate steganography (Least Significant Method-LSM) and cryptography Advanced Encryption Standard (AES) is thought to give a safer method to information transmission through any unstable or public organizations. Prior to inserting the content in the picture, the text is scrambled utilizing AES calculation. Utilizing least significant bit (LSB) strategy, encoded the text installed in low-low (LL) subband wavelet decayed of a picture. Converse wavelet changes applied will lead to the output picture is communicated to the recipient. Presently at the collector's end, the picture changed utilizing wavelet and encoded text will be extricated by utilizing the LSB technique. This paper shows how AES calculation is utilized in the decoding of the outcome.
2016
The rate at which encrypted messages are being sent over the internet and other electronic means will easily capture the attention of hackers and possibly make them try to disrupt or even hack those messages so as view the original message. Steganography is designed to hide the presence of a message by hiding the secret message inside an innocent file. For effective security, steganography is sometimes combined with cryptography. In this paper, steganography and cryptography are combined to provide a robust system capable of encrypting a secret message using RSA algorithm. To hide the message, advanced LSB method is used. The original message is encrypted at the initial stage and then separated into two portions P1 and P2. An XOR operation is applied to the first portion (P1) using the odd location and to the second portion (P2) using the even position of the LSB+1.The Position of the LSB is then used to hide the XORed encrypted message. Keywords-cryptography; RSA algorithm; stegano...
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured.
2014
Steganography is the technique of hiding information so that any intermediate third party is unaware about the presence of secret message. Digital steganography uses some digital media as the cover for the secret message, like in our case, we have used digital images as the cover media. Essence of steganography is that the third party should never be able to detect the presence of secret message in the cover image. Once the third party detects the secret message, it is assumed that the steganography technique has failed to serve its purpose. The proposed model presents a novel approach of develop a secure data hiding technique of Steganography using wavelet transform, Some logical operations, binary convertor, along with random number generation method. Keywords— Digital image, information hiding, steganography, PSNR value, LSB.
IOSR Journal of Computer Engineering, 2016
As use of computer networks and internet is growing very fast and admiring day by day, information security is become a major concern in computer networks. There is always risk in violation of network security which leads a need of an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it. Encryption is one of the security technique widely used to ensure secrecy. Encryption is an entirely mathematical process that takes in data, performs some predefined mathematical operations on the data, and then outputs the result. Blowfish is one of the superlative encryption algorithms because it requires less execution time, memory and has high throughput. However if any eavesdropper detects the presence of encrypted data he or she can try several attacks in order to get the original data. So there is a need to provide a two layer approach for better security. That's why this work presents a security system using combination of cryptography and steganography to enhance the security.
International Journal of Advanced Computer Science and Applications, 2014
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the features such as robustness, undetectability and capacity etc. So a new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other's weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. This paper also describes the basics concepts of steganography and cryptography on the basis of previous literatures available on the topic.
In the cryptographic steganography system, the message will first be converted into unreadable cipher and then this cipher will be embedded into an image file. Hence this type of system will provide more security by achieving both data encoding as well as data hiding. In this paper we propose an advanced steganocryptic system that combines the features of cryptography and steganography. In this proposed steganocryptic system we will encrypt the message into cipher1 by using Kunal Secure Astro-Encryption and we again encrypt this cipher to cipher2 by using grid cipher technique. Advantage of Kunal Secure Astro-Encryption is that it generates random useless points in between, thus fixed size messages can be generated providing more security compared to other cryptographic algorithms as the number of characters in original message cannot be found from encrypted message without the knowing the black holes. Now we will embed this cipher2 into image file by using visual steganography .In this proposed steganocryptic system we will use modified bit insertion technique to achieve visual steganography. This proposed system will be more secure than cryptography or steganography techniques[digital steganography] alone and also as compared to steganography and cryptography combined systems.
Proceedings of the Fourth International Conferences on Internet Technologies and Applications (ITA 11)
Encryption system is the mechanism of protecting secrets by applying mathematical functions to original text to produce cipher text that is difficult to decrypt. In this paper, an encryption mechanism is presented which is the combination of cryptography and steganography technology. On the proposed system cryptography algorithm is chosen for encrypt plaintext by applying mathematical function. On the other hand steganographic algorithm is used for hiding the encrypted data into an image that no one can see the secret information. LSB (Least Significant Bit) method is used on the steganography part for hiding information into an image. Four keys are needed for decryption the information.
The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. Several techniques such as steganography and cryptography have been employed to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and steganography has proven to have taken data communication security to another level. In this work, a review of these techniques is presented with major focus on two journals titled " Dual Layer Security of Data Using LSB Image Steganography Method and AES Encryption Algorithm " [1] and " An Efficient Data Hiding Scheme Using Steganography and Cryptography Technique " [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques could improve security of data communication beyond the present levels if properly combined with little or no performance degradation.
2013
In this paper we hide the message (data), using the concept of Steganography; in such a way that on-one apart from the sender and intended recipient even realizes there is a hidden message. The proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The new approach is based on the LSB (Least Significant Bit) method. Also a new approach is proposed to securely sending the message using Cryptographic concept in Steganography. From the sender side the encrypted message is send and hides it in a saved picture and encodes the message. At the receiver side decryption is done to get original message.
International Journal of Information Technology, Modeling and Computing, 2014
A new technique proposed with the combination of cryptography and steganography enhanced with new secure feature for generating a new security system. Cryptography and Steganography are two popular ways for secure data transmission in which the former distorts a message so it cannot be understood and another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be introduced in applications such as transferring secret data that can be authentication of various fields.
Information security is becoming more important and attracting much attention nowadays, as the amount of data being exchanged over the internet increased. There are various techniques to secure data communication, but the well-known and widely used techniques are cryptography and steganography. Cryptography changes data into another form that is unreadable by anyone except the intended receiver. Steganography hides the existence of secret data in a cover medium, so that no one can detect the hidden data except the authorized receiver. In this paper, we proposed a new technique for securing data communication systems by combining cryptography and steganography techniques. The cryptography algorithm that was used in this paper is Modified Jamal Encryption Algorithm (MJEA); it is a symmetric (64-bit) block encryption algorithm with (120-bit) key. For steganography, we designed an enhanced form of Least Significant Bit (LSB) algorithm with (128-bit) steg-key. The performance of the proposed technique has been evaluated by considering several experimental tests, such as impressibility test, embedding capacity test and security test. For this purpose, the proposed technique was applied on several 24-bit colored PNG cover images. All experimental results proved the strength of the proposed algorithm in securing the transition of data over unsecure channels to protect it against any attack. Furthermore, the simulation results show the superiority of our proposed algorithm when compared with other algorithms in terms of PSNR and embedding capacity.
TJPRC, 2014
Internet is a big means for transferring lot of data in the form of images, text, and all multimedia. Data security is a major concern in terms of its availability, confidentiality and authentication goals. Communication channel security also plays an important role, but channel can be compromised so there is need of data security. Images serve a means for transferring lot of data secretly, many techniques have been proposed which use images to carry lot of secret data for this encryption is best method. Cryptographic algorithms include symmetric and asymmetric techniques and hash function for encryption purpose. The paper discusses techniques that use RSA, DES, AES, MAES algorithms applied on images along with orthogonal transforms for Image. The comparison parameters considered here are the cryptographic techniques, algorithm applied, type of algorithm and performance parameter.
IRJET, 2022
The art of concealing / hiding information or data bits on a cover or carrier file is known as Steganography. We can envisage Steganography being utilized in nearly any sort of file, including image files. Masking information, such as text, photos, or audio files, within other image files is known as Image Steganography. Image steganography enables the communication between one another, secretly and stealthily. To add even more security, the secret message, which is contained within the image file, is encrypted. Data compression is an important aspect of information security since compressed data is more secure and easier to manage. By encrypting data and hiding it from attackers, the primary purpose is to save physical space on storage devices and reduce the time it takes to transport data over the internet. The secret message is then coded and compressed before being combined into the compressed cover image file. The result stego-image is then sent to the receptor where the message is uncompressed, decoded and retrieved. This survey focuses on the methods implemented by authors of several works for hiding and securing the information.
Engineering, Technology & Applied Science Research
Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.