scholarly journals Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm

Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.

2021 ◽  
Vol 5 (3) ◽  
pp. 277
Author(s):  
Ade Davy Wiranata ◽  
Rima Tamara Aldisa

The research objective is to hide messages through images using the LSB (Least Significant Bit) method and Caesar Chipper and Rivest Code 4 encryption. The LSB (Least Significant Bit) method is used as a message hiding technique in steganography where hiding hidden messages is done by changing a few bits in the segment. image with a secret message. The results of this study resulted in an implementation using the Least Significant Bit (LSB) to be applied to institutions with an interest in maintaining the confidentiality of encrypted image output, changing the image file size and sound (audio) file size.Keywords:Steganography, Least Significant Bit (LSB), Caesar Chiper and RC4.


2018 ◽  
Vol 7 (3.2) ◽  
pp. 713
Author(s):  
S Suherman ◽  
Naemah Mubarakah ◽  
Marwan Al-Akaidi

There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.  


Author(s):  
Sof'ya A. Serebryakova ◽  
◽  
Mikhail V. Filippov ◽  

Nowadays authors of cinematographic works are often faced to protect copyright need. One way to resolve such an issue is to use digital watermarks. Digital watermarks are some kind of encrypted message that allows distinguishing the original work from its forgery. At the same time the audio or video file with a built-in message looks no different from a file without a digital watermark, what is a key advantage of its use and at the same time it makes difficult to playback the file illegally. A set of methods for undetectable hiding some bit sequences in others is called digital steganography. An important advantage of steganography over cryptographic methods is the hiding the fact of embedding a code message. Embedding digital watermarks by using the least significant bit method allows embedding a digital watermark in such a way that a person will not notice any changes in the video file. The article considers the known methods of embedding digital watermarks and the structure of the AVI file format. It presents an algorithm for embedding and extracting digital watermarks for AVI video files based on LSB method with using hash-function. The algorithm provides a counteraction to the spread of counterfeit products.


2015 ◽  
Vol 74 (6) ◽  
Author(s):  
Mohsen Bazyar ◽  
Rubita Sudirman

Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol, audio file can be uploaded, downloaded, and transmitted through the internet. This benefit of transmission makes the interest in using audio as cover object in steganography become much stronger. Capacity which is one of the most important properties of audio steganographic methods, evaluates the amount of possible embedding data within the audio file. A new embedding technique of audio steganography is proposed to increase the carrier medium capacity for substitution additional hidden message. With respect to the performed tests, the algorithm succeeds to increase the depth of embedding layer, without having effects on the signal transparency. The maximum number of bits without significant effect on host audio signal for LSB audio steganography is 4 LSBs. The secret message bits are hidden into variable and multiple LSBs layer in this method. Experimental results show that the use of this new technique which apply 7 LSBs for data embedding in comparison the LSB standard algorithm with 4 LSBs improve data hiding capacity of carrier audio by 35% to 55%. It can be observed from listening tests that there is no significant difference between the stego audio acquired from the novel technique and the main signal.  


2019 ◽  
Vol 29 (1) ◽  
pp. 1216-1225 ◽  
Author(s):  
Zeyad Safaa Younus ◽  
Ghada Thanoon Younus

Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.


2021 ◽  
Vol 19 (49) ◽  
pp. 53-61
Author(s):  
Ahlam Majead Kadhim ◽  
Huda Muhamed Jawad

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.


Steganography is a method used for inserting the secret information into an another medium such as text, images, audio signals or video signals, without revealing its existence in the medium. In video steganography, a video file will be used as a cover medium and secret message embedded inside the cover medium. Video are picture perfect for embedding the secret message because of its large embedding capacity. We propose three secure steganography algorithms that embed a bit stream of the secret message into the approximation coefficients of the integer wavelet transform(IWT), DWT and using LBP method to form stego video. The geometric alteration between the cover video and the stego video is measured by using the Mean Square Error (MSE) and the PSNR. The new results show that, the proposed algorithms can hide the secret message with a great payload capacity with a high level of security and a greater invisibility.


Author(s):  
Sapria Ulandari Lubis

The problem of the originality of the file is about how the file can be maintained its authenticity and ensures that the file has never been changed at all. In this study the object file used is the audio file. The process of manipulating files often occurs during data transmission activities from the sender to the recipient. The solution that can be done to handle the crime of manipulation is to apply a hash type cryptographic technique in which the hash value is encrypted from an audio file that can be used as a keyword to ensure the audio file has never been manipulated or has been manipulated. The hash cryptographic algorithm used is the type of MD5 algorithm. The results obtained from the process of implementing the MD5 algorithm using MATLAB R2010a software and the HASH Pro application are audio file hash codes. Keywords: Implementation, Encryption, Decryption, MD5 Method, Cryptography.


2015 ◽  
Vol 12 (2) ◽  
pp. 431-436
Author(s):  
Baghdad Science Journal

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.


Sign in / Sign up

Export Citation Format

Share Document