Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
— Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution.. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
IRJET, 2022
The art of concealing / hiding information or data bits on a cover or carrier file is known as Steganography. We can envisage Steganography being utilized in nearly any sort of file, including image files. Masking information, such as text, photos, or audio files, within other image files is known as Image Steganography. Image steganography enables the communication between one another, secretly and stealthily. To add even more security, the secret message, which is contained within the image file, is encrypted. Data compression is an important aspect of information security since compressed data is more secure and easier to manage. By encrypting data and hiding it from attackers, the primary purpose is to save physical space on storage devices and reduce the time it takes to transport data over the internet. The secret message is then coded and compressed before being combined into the compressed cover image file. The result stego-image is then sent to the receptor where the message is uncompressed, decoded and retrieved. This survey focuses on the methods implemented by authors of several works for hiding and securing the information.
TJPRC, 2013
Today’s cyber world is growing rapidly over Internet technologies & its applications needing high level of safeguard for expensive data during transmission over the open communication channel. Image steganography is a technique for hiding information into a cover image. Least Significant-Bit (LSB) replacement based method is most common steganographic technique in spatial domain owing to its simplicity and hiding capacity. Most of existing approaches focus on the embedding strategy with less consideration to the pre-processing such as encryption of secrete image. The conventional steganography algorithm does not provide the preprocessing required in image for better security and privacy. The proposed work presents an exclusive technique for Image steganography based on the Advance Encryption Standard (AES) using 128 bit block size of plaintext & 128 bits of Secrete key. The preprocessing provide high level of security as extraction of image is not possible without the knowledge of mapping rules of AES and secrete key .
In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive information in another transmission medium to achieve secure and secret communication. In this paper we present the dual layer of security to the data, in which first layer is to encode data using Least Significant Bit image steganography method and in the second layer encrypt the data using Advance Encryption Standard Algorithm. Steganography does not replace the encryption of data, instead it provides extra security feature to it. In our work secret text message is hiding behind the digital image file and this image file is then encrypted using AES encryption algorithm.
In this paper, the author presents an enhanced version of modified AES for image-audio steganography technique. The proposed technique improves the security level of encryption and steganography process. Digital image processing is a wide area for research. Images are widely used today. Processing on images means some editing, preprocessing, restoration, compression, steganography and encryption. Steganography is concealing secret information into cover information. Encryption is mainly used for encoding the content of an image into something that cannot be understandable by unauthorized persons. Authorized are those who have the legal access to the content. Nowadays everyone is after information so; it becomes the need today to secure the (confidential) information. The proposed AES technique is an enhancement of modified AES method, which focuses on improving the security of steganography images. Modified AES is described in four steps: first step is key expansion, second is sub bytes modification, third is new shift rows and at last mixing of columns is applied to the matrix. This technique will provide better security and good quality encryption and decryption. Results shows that this method takes less time with the high quality of encrypted image
The objective of image processing is to extract important information from images. The information can be in images or some vital data which can useful for further computing and analysis. In this paper a technique is evolved for encrypting the plain text multiple times. The ASCII codes(0-255) for the text information is utilized and even if intruder applies the brute force method for any attack, then he/she must have to exercise a trail for 256! times which is quite absurd. Moreover, the multiple encryption method makes the system further secured. This paper focuses on a technique that would offer better and secured technique to enable secret data transmission for commercial financial transactions using steganography and AES algorithm.
Nonlinear Engineering, 2017
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.
Two New Approaches for Image Steganography Using Cryptography, 2015
The process of jumbling up the contents of a secret message so as to secure it, is known as cryptography, whereas the process of hiding the very existence of a secret message is known as steganography. The term "steganography" describes the method by which the contents of a secret message are concealed inside some other medium, so as to avoid any kind of detection by an intruder. In this paper, we have proposed two new approaches wherein both cryptography and steganography are used to encrypt the data and also to conceal these encrypted contents in some other medium. In the first method proposed, we have secured an image by converting it into an encrypted text using S-DES algorithm and a secret key and then concealing this encrypted text in some other image, whereas in the second method, we have secured an image directly by encrypting it using S-DES algorithm and an image key. The contents thus obtained are concealed inside another image so as to hide its very existence. Both these techniques have been tested and it has been observed that they prevent the possibilities of steganalysis also.
2021
Received April 19, 2021 Revised April 27, 2021 Accepted April 27, 2021 In the world of increasing usage of the internet, data security plays an important role in achieving confidentiality, authentication, and integrity for secure communication. Cryptography and Steganography is the method to achieve data security through which information is protected and only the intended person can read the information. In this paper, a technique is proposed where Steganography and Cryptography are used in a combined manner for securing the data. In which the LSB method is used for embedding and extracting the data from the image. A symmetric cryptographic algorithm used to encrypt the data is done by using Armstrong numbers before embedding the data into the image. A key is generated using Armstrong numbers and any specified string and the same key generated is used for encrypting and decrypting the data.
2020 International Conference on Smart Electronics and Communication (ICOSEC)
In the new era of modern science and technology is developing day by day, data confidentiality is risky, all over the world and it increases rapidly. In this paper, a new approach to hiding the data using steganography techniques is proposed based on AES and RC5 algorithm cryptosystem. S teganography is the beauty of hiding secret data behind the digital images, videos, audios and text to cover the secret communication. A cryptosystem is the process which given our method more perfection. The visual quality of the cover image nice, no one can think about it how confidential data are transmitted using this method. This proposed method and algorithm capacity is highly flexible than other published algorithm. The AES and RC5 algorithm had no complexity and it looks like very well to hide the confidential data.
2011
In this paper, actually we will present a technique of secure data transmission through hiding of data in image file by replacing it’s one of the LSB bit. The watermarked bit embedded into image sample to increases the robustness against noise hence by combining cryptography and steganography we will increases the security of data.
International Journal of Modern Trends in Engineering & Research, 2016
This project focuses on designing a system in order to secure information form attacker using two security layers: 1.Cryptography 2.Steganography.This is an approach taken to enhance the security which will not be easy to break. The cryptographic algorithms which are commonly in use are RSA and AES. AES is the new standard after DES (the previous encryption standard); AES is a symmetric algorithm and nowadays it is widely used to encrypt and send data via internet, however for ultimate security we are combining both cryptography and steganography in one system. Our propose is to provide a high level of cracking complexity naturally it will result security enhancement.
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non -Repudiation.
International Journal of Computer Applications, 2016
Nowadays, network has important roles for transferring data accurately and fast from source to a destination. The data is not secure enough to transfer highly confidential. The security of information has become one of the principle challenges of resource sharing with data communication over computer network. Cryptography and Steganography are two methods for protecting data from intruders while transferring over an open channel network. Cryptography is a method to encrypt data and steganography is the art and science of hiding secret message in a cover image. In this paper a Hash Least Significant Bit (H-LSB) with Affine cipher algorithm has been proposed for providing more security to data in a network environment. First we encrypt the data with the new cryptography algorithm and then embed in the image. Eight bits of the secret message are divided into 3, 3, 2 and embedding into the RGB pixels values of the cover image respectively. A hash function is used to select the particular position of insertion in LSB bits. This system allows a message sender to select keys to encrypt the secret message before embedding into the image and a receiver is used the keys to decrypt the message. Receiver can be decrypted the encrypt message with incorrect the keys but to a different form from the original message. This system has the ability to provide better security while transferring the secret message from one end to the other end in network environment.
International Journal of Advanced Trends in Computer Science and Engineering , 2021
The transmission of information through any channel of correspondence needs solid encryption procedures with the end goal of information security. The computerized watermarking assumes a significant part in inserting data into an advanced picture signal, for the check and character of its proprietors. In discrete wavelet change, "investigation channel bank" can be utilized for dissecting picture signals by going through. The channel bank comprises high and low pass channels at every deterioration stage. In this paper, a technique to consolidate steganography (Least Significant Method-LSM) and cryptography Advanced Encryption Standard (AES) is thought to give a safer method to information transmission through any unstable or public organizations. Prior to inserting the content in the picture, the text is scrambled utilizing AES calculation. Utilizing least significant bit (LSB) strategy, encoded the text installed in low-low (LL) subband wavelet decayed of a picture. Converse wavelet changes applied will lead to the output picture is communicated to the recipient. Presently at the collector's end, the picture changed utilizing wavelet and encoded text will be extricated by utilizing the LSB technique. This paper shows how AES calculation is utilized in the decoding of the outcome.
destroying the property of the file significantly. The proposed bit exchange is reversible, i.e. the decryption is done in the reverse way of the encryption. The authors applied the present steganography algorithm on image files and the result found was satisfactory.
IJARCCE, 2015
During the recent times, there has been tremendous growth in transfer of data across the globe which ultimately has boosted data communication over the computer networks. For any data communication network, the information content security of the messages is of prime concern. Steganography and Cryptography are two different data hiding techniques. Steganography puts a cover onto the messages by some other form of digital media whereas Cryptography on the other hand performs the encryption of the message. In this paper, we present a combination of both these techniques wherein the text is first hidden into some form of cover image using Least significant bit (LSB) hiding method and then encryption using Advanced Encryption Standard (AES) is performed on to the stego image. The combination of both these algorithm will certainly ensure high degree of security, integrity, capacity and robustness to the embedded data. Using GUI based MATLAB simulation, a comparative analysis is being made by employing different formats of the images for learning variations in performance evaluation parameters such as delay, Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Absolute Mean Square Error (AMSE). The objectives of this paper are to provide security against visual as well as statistical attacks and to ensure better quality of received information.
International journal of engineering research and technology, 2019
Steganography is the advanced methodology for concealing secret data than the other strategies used to date. There are often cases when it is not possible to send messages openly or in encrypted form. This is where steganography play its role. While cryptography provides privacy which is intended to provide secrecy. Steganography aims to hide the secret messages and also for communication and transferring of data. So nobody aside from the licensed sender and receiver are tuned in to the existence of the key information. This paper intends to give an overview of image steganography and its uses and hiding the files (text file, audio file, video file, image file, etc.,) by using LSB and AES algorithm where AES is used for password protecting system so that if anyone can find the Stego-image they will not read the message because data is still in the encrypted form and LSB is used for hiding the data.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology , 2019
Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.
2014
Now a day’s Steganography plays an important role in defence, public sectors works and internet. Cryptography created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt, decrypt data in order to keep message secret .Unfortunately sometimes it may not be enough to keep the contents of a message secret .It may also be necessary to keep the existence of the message secret .The technique used to implement this is called Steganography and it different from cryptography in the sense cryptography focuses on keeping contents of a message secret Steganography focuses on keeping the existence of message secret for more security we proposed new methods that combines with both cryptography and Steganography. There are two types of techniques are implemented, The first technique implemented sequentially starting with the top left pixel and then encodes information from top to bottom and left to right, and another techniques implemen...
In today's world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.