Securing Color Image Using Combined Elliptic Curve Crypto-System and Hill Cipher Encryption Along with Least Significant Bit - Steganography

Author(s):  
N. Faizal ◽  
S. Sharan ◽  
Panchami S. Nair ◽  
Devi S. Sankar
Author(s):  
Rama Aria Megantara ◽  
Fauzi Adi Rafrastara ◽  
Syafrie Naufal Mahendra

The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security needs to be done. Form of data security in the form of cryptography and steganography. One of the cryptographic techniques is the hill cipher algorithm. Hill ciphers include classic cryptographic algorithms that are very difficult to solve. While the most popular steganography technique is Least Significant Bit (LSB). Least Significant Bit (LSB) is a spatial domain steganography technique using substitution methods. This study discusses the merging of message security with hill cipher and LSB. The message used is 24-bit color image for steganography and text with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 64 db, the entropy value ranges from 5 to 7 and the results of travel time <1 second.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2019 ◽  
Vol 148 ◽  
pp. 399-408 ◽  
Author(s):  
Said Hraoui ◽  
Faiq Gmira ◽  
M.Fouad Abbou ◽  
A.Jarrar Oulidi ◽  
Abdellatif Jarjar

Author(s):  
Anand B. Joshi ◽  
Dhanesh Kumar ◽  
D. C. Mishra

Security of digital data is an important task in the present era. In this paper, we propose a new scheme of digital image encryption and decryption method based on three-dimensional (3D) Arnold cat map (ACM) and elliptic curve. In this proposed encryption method, we have applied 3D ACM on the digital color image which performs the dual encryption first, it performs the permutation and second, it performs the substitution of image pixels. After that, elliptic curve cryptography (ECC) is used to encrypt the image, for this a mapping method is proposed to convert the pixels of the image as points on the elliptic curve. Further, a mapping inverting method is proposed for decryption and then 3D inverse Arnold cat map (iACM) is applied to get the original image. The statistical and security analyses are done on various images and the experimental results show the robustness of the proposed method.


2018 ◽  
Vol 7 (3.29) ◽  
pp. 65
Author(s):  
P Sivananthamaitrey ◽  
P Rajesh Kumar

Dual digital watermarking has emerged as a successful solution for copyright protection, tamper detection and localization. However, several problems related to the robustness, capacity, tampered area detection still mystifying. This paper presents a high capacity dual watermarking mechanism for digital color image. An invisible robust watermark is embedded in the Green component of the host image by using a hybrid combination of Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) for copyright protection. A fragile invisible watermark based on the Least Significant Bit (LSB) replacement approach is embedded in the Blue component of the image for tamper detection and localization. The proposed technique focuses on robustness and imperceptibility while maximizing embedding capacity that makes this technique a multipurpose watermarking scheme.


2018 ◽  
Vol 16 (03) ◽  
pp. 1850021 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Wenwen Hu ◽  
Ping Fan ◽  
Gaofeng Luo

In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be [Formula: see text] and [Formula: see text], respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with [Formula: see text] image size and 24-qubit grayscale is further expanded to an image with size [Formula: see text] and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with [Formula: see text] size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.


Author(s):  
Mohamad Tariq Barakat ◽  
Rushdi Abu Zneit ◽  
Ziad A. Alqadi

Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.


2019 ◽  
Vol 5 (1) ◽  
pp. 6-17
Author(s):  
Aldo Aldo ◽  
Lukman Hakim

Pertukaran informasi sangatlah mudah dengan mengunakan internet sebagai penghubung dari pihak yang mengirim informasi ke pihak yang menerima informasi tersebut. Semakin mudah juga bagi pihak yang tidak berwenang untuk mendapatkan informasi yang akan dikirimkan dari pihak pengirim ke pihak penerima melalui internet. Maka itu informasi tersebut memerlukan fitur keamanan. Penyandian merupakan sebuah teknik keamanan untuk mengubah sebuah informasi berupa text, citra digital, suara, video menjadi sebuah informasi yang tidak memiliki arti tertentu atau teracak. Jika pihak yang memiliki informasi yang telah di sandikan ini tidak memiliki kunci untuk membuka enkripsi tersebut maka informasi tersebut tidak dapat dibaca dikarenakan tidak memiliki makna tertentu. Penyisipan merupakan sebuah fitur keamanan dimana sebuah informasi akan dimasukan kedalam sebuah media penampung atau informasi tersebut disembunyikan didalam media penampung. Pada penulisan ini akan difokuskan untuk membuat sebuah sistem yang dapat menyandikan , mendekripsi sandi , menyisipkan sebuah informasi ke dalam sebuah media penampung dan mengekstraksi informasi dari media tampung yang dapat berupa citra digital dengan format : jpeg, bitmap, dan png yang berguna untuk meningkatkan tingkat keamanan dari sebuah informasi.Algoritma penyandian merupakan algoritma yang mengubah sebuah informasi (plain text) menjadi sebuah informasi yang telah teracak (ciphertext) mengunakan kunci yang telah ditentukan dari pihak pengirim dan penerima. Algoritma penyandian yang digunakan adalah algoritma Hill Cipher. Yang akan dikombinasikan dengan metode Least Significant Bit sebagai metode pada proses penyisipan informasi. LSB akan mengubah setiap nilai bit terakhir dari setiap piksel pada citra tampung (cover) sesuai dengan nilai biner pesan secara berurutan, sehingga menyebaban hasil akhir dari penyisipan (stego image) tidak akan mengalami perubahan secara signifikan jika dilihat oleh mata manusia.


2018 ◽  
Vol 31 (2) ◽  
pp. 193 ◽  
Author(s):  
Hussein L. Hussein

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant bits of blue sector of the image.


Sign in / Sign up

Export Citation Format

Share Document