scholarly journals Image Security using Steganography and Cryptography

Author(s):  
Kavia .

Cryptography and Steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known . According to my proposed work in which both steganography and cryptography are combine and give good security for data. Firstly, the encrypted images has been hidden using image steganography method. Secondly, the Hash function algorithm has been modified and used to encrypt the stego image by using 128 digit hexa-key. Therefore, two levels of security have been provided using the proposed technique. In addition, the proposed technique provides high embedding capacity and better quality stego images.

2018 ◽  
Vol 7 (2) ◽  
pp. 40-43
Author(s):  
Prakhar Agrawal ◽  
Arvind Upadhyay

Steganography and cryptography are two major aspects of data security . In this paper we are going to provide the survey of different techniques of LSB based Steganography that used cryptography algorithms to secure sensitive information. Steganography is used to hide data and Cryptography is used to encrypt the data. Although cryptography and steganography individually can provide data security, every of them has a drawback. Drawback associated with Cryptography is that, the cipher text looks meaningless, so the unintended user can interrupt the transmission or make more careful checks on the information from the sender to the receiver. Drawback associated with Steganography is that when the presence of hidden information is revealed or even suspected, the message is become known[1].By combining these two methods we can solve both of the above problem. First we encrypt the data using any cryptography technique and then embed the encrypted text into the image. Steganography is the process which hides the presence of secure data during communication. On the other hand cryptography is encrypting and decrypting of secure data and information with a secrete key so that no one can be understand the message directly.


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


2020 ◽  
Vol 10 (2) ◽  
Author(s):  
Yusliza Yusoff ◽  
Tassvini A/P Gunaseharan ◽  
Tassvini A/P Gunaseharan

Image steganography is a process of hiding message behind an image file which focuses on protecting the existence of a message secret. There is a security risk in the current image steganography process. Since stego-image will be transferred on unsecured Internet network, attackers will attack and try to decode the message behind the stego-image because of the vulnerable algorithm. Therefore, it is very important to search for a method to make the process of encoding the stego-image more secure. There are many algorithms developed to make the stego-image become more secured. However, the usage of Knight Tour (KT) and Rivest Cipher Four (RC4) algorithms in image steganography are still insufficient although that the algorithms are claimed to be secured and robust. KT algorithm is an easy mathematical technique that can increase the security of hidden information, meanwhile, RC4 is known as a simple algorithm but systematic in cover image programming. In this paper, the performance of KT and RC4 algorithms are observed to measure the security and robustness of JPG image format. Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used to observe the image quality to improve the security factor in the stego-image. From the results, it is found that KT generated better performance compared to RC4. 


2020 ◽  
Vol 14 (3) ◽  
pp. 291-312
Author(s):  
Hong Xiao ◽  
Panchi Li

Digital steganography is the art and science of hiding information in covert channels, so as to conceal the information and prevent the detection of hidden messages. On the classic computer, the principle and method of digital steganography has been widely and deeply studied, and has been initially extended to the field of quantum computing. Quantum image steganography is a relatively active branch of quantum image processing, and the main strategy currently used is to modify the LSB of the cover image pixels. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel steganography using reflected Gray code for color quantum images, and the embedding capacity of this scheme is up to 6 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 6-bit segments. For 6 bits in each segment, the first 3 bits are embedded into the second LSB of RGB channels of the cover image, and the remaining 3 bits are embedded into the LSB of RGB channels of the cover image using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.


2020 ◽  
Vol 10 (4) ◽  
pp. 51-62
Author(s):  
Aruna Malik ◽  
Sonal Gandhi

In the era of cloud computing and Big Data, steganographic methods are playing a pivotal role to provide security to sensitive contents. In the steganographic domain, pixel-value differencing (PVD) proposed by Wu and Tsai has been one of the most researched and popular methods as the PVD technique provides good quality stego-image along with high embedding capacity. This article extends the Wu and Tsai's work by proposing a new hybrid steganography scheme which works in two phases to increase the embedding capacity along with stego-image quality. In the first phase, the cover image is preprocessed using a segmentation table to make the image more robust for PVD method. In the second phase, the resultant image is partitioned into 2×1 pixels size blocks in a non-overlapping fashion and then modulus function based scheme is applied in reversible manner. Thus, a significant amount of secret data is embedded into the image. The experimental results prove that the proposed scheme has significantly improved in embedding capacity and quality as compared to the other related PVD-based methods.


Symmetry ◽  
2019 ◽  
Vol 11 (1) ◽  
pp. 79 ◽  
Author(s):  
Lin Li ◽  
Chia-Chen Lin ◽  
Chin-Chen Chang

A subtopic of visual secret sharing (VSS) is information hiding-based VSS (IH-VSS), which embeds secret messages into images using an information hiding technique. In the IH-VSS scheme, stego-images are divided into shadows under the guidance and constraint of some predetermined approaches. In order to achieve the purpose of security and reliability, the hidden information cannot be recovered unless a certain amount or all of the credible shadows work together. In this paper, we propose a (2, 2) IH-VSS scheme with reversibility and friendliness. In the shadow generation phase, two meaningful shadow images are produced and then distributed. In the extraction and restoration phase, the hidden secret information and cover image, respectively, can be reconstructed credibly and correctly. No complex computation of shadow generation is involved, but high security is achieved. Moreover, a satisfying peak-signal-to-noise ratio (PSNR) is obtained with the high embedding capacity of 1.59 bpp in a very simple and effective way.


Sign in / Sign up

Export Citation Format

Share Document