scholarly journals Signature Text,Image and Audio Hiding in a Color Image using Steganography and Cryptography

2021 ◽  
Vol 23 (06) ◽  
pp. 709-720
Author(s):  
Shivansh Bishen ◽  
◽  
Paurav Malik ◽  
Saloni Rao ◽  
Prakash Biswagar ◽  
...  

Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part of computing and communication. In this report, we’ve got explored techniques that blend cryptography and steganography together. Steganography may be a specialty of science to manage and conceal a chunk of important information inside image, audio, video, or text documents. Steganography may be a method and study of composing a secret communication specified only the source and also the targeted beneficiary will realize the concealed information. the information concealed or covered process starts with the steganography method by identifying a network canopy and redundant parts, i.e. only permitted persons would be able to change without affecting the standard of that medium. The encoding method generates a Stego medium by substituting these redundant bits with the concealed message content. In this report, various approaches for information hiding using both cryptography and steganography is proposed keeping in mind two considerations-size of the encrypted object and degree of security. Here, signature image, text, audio information is kept hidden into a cover image using the private key of sender and receiver, which extracts the data from stego image employing a public key. This approach is often used for message authentication, message integrity, and non-repudiation purpose.

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


2021 ◽  
Vol 6 (2) ◽  
pp. 72-81
Author(s):  
Reham Ahmed El-Shahed ◽  
◽  
Maryam Al-Berry ◽  
Hala Ebied ◽  
Howida A. Shedeed ◽  
...  

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for the cover image was in the range of 41 to 51 dB. DWT was added to increase the security of the method and this enhanced technique increased the cover PSNR to 48 t0 56 dB. The SSIM is 100% and the NCC is 1 for both implementations. Which improves that the imperceptibility of the algorithm is very high. The comparative analysis showed that the performance of the algorithm is better than other state-of-the-art algorithms


Information security is an important task on multimedia and communication world. During storing and sharing maintaining a strategic distance from the outsider access of information is the difficult one. There are many encryption algorithms that can provide data security. In this paper two of the encryption algorithms namely AES and RSA are implemented for color images. AES (Advanced Encryption Standard) is a symmetric key block cipher published in December 2001 by NSIT (National Institute of Standards and Technology). RSA (Rivest-Shamir-Adleman) is an asymmetric key block cipher. It uses two separate keys, one for encryption called the public key and other for decryption called the private key. Both the implementation and analysis are done in Matlab. The quality and security level of both the algorithms is analysed based on various criteria such as Histogram analysis, Correlation analysis, Entropy analysis, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity), PSNR (Peak Signal-to-Noise Ratio).


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Ritvik Shukla ◽  
Salini Bose ◽  
Shubham Shukla ◽  
Kamal Kishor Upadhyay ◽  
Nikhlesh Kumar Mishra ◽  
...  

AbstractIn the current era of data communication everyone deals with the huge amount of data in form of text, audio, video and different other formats in which everyone want a secure and higher bandwidth channel to transmit and receive so, only the optical channel provides the solution of above said problem. The only difficulty with the existing model that the data from electrical domain first converted in form of light (optical domain) at the transmission end while after receiving the data at the receiver end it will be further converted in form of electrical signal for extracting the message. This type of conversion from one domain to other gives the energy loss. In the current research article, we proposed a model of optical processor which transmit and receive the data without conversion which provides an energy efficient optical technology. By adding reversibility, heat bender can be further reduced. In this manuscript, an arithmetical logic unit has been created, a photonic reversible complete subtractor and an irregular logic portal. SOA-MZI structure is the basic component of the architecture. The method is mainly carried out by the semiconductor Amplifier, using nonlinear properties such as cross-gain modulation and cross-phase modulation. The efficiency deciding factor for the whole system is 21.23 and 53.27 dB in the average extinction ratio. The cost of the arithmetic logic unit optically constructed is 9.


2019 ◽  
Vol 8 (3) ◽  
pp. 1977-1981

Visible Light Communications (VLC) system is called Light Fidelity One such example, analog data is passed to a LED (Light-Emitting Diode) bulb (using signal processing technology), after that it transmits data (which is implanted in its beam) to the detector or photodiode. The small commutes in the brisk feeble of LED bulbs is modulated by the receiver circuit into electrical signal. The signal is then reversed into a duplex data runnel that could be recognized in the same way that of audio, video and web programs that run on devices that has internet enabled. Wi-Fi is vulnerable to breaches involving various security issues such as Rouge Access Points, Denial of Service, Wireless Trespasser, Data Interruption, End point attacks etc. To overcome such restrictions, this paper proposes application level substructure for data communication using Li-Fi (Light Fidelity) Technology. By using LED lights as a transmission medium, the indoor wireless communication is achieved in much faster rate than the one WiFi (Wireless Fidelity) can provide.


2020 ◽  
Vol 8 (5) ◽  
pp. 5560-5563

Wireless Sensor Network (WSN) extends the advantages of small price, quick employment, and shared transaction medium, although it induces a lot of security and secrecy challenges. In this paper, the Elliptic Curve Cryptography based Secure Data Communication and Enhance sensor Reliability (SDER) in WSN. In this scheme, an Elliptic Curve Cryptography (ECC) Weierstrass function is used to verify the sensor reliability, and ECC cryptography technique is useful for providing the data security in the network. The simulation result demonstrates that the SDER reduces both the packet loss rate and the network delay.


Author(s):  
SOFIA SAIDAH ◽  
NUR IBRAHIM ◽  
MOCHAMMAD HALDI WIDIANTO

ABSTRAKPada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital. Metode yang digunakan diantaranya adalah metode kriptografi dan metode steganografi. Implementasi pada sistem yang dibangun dilakukan dengan menyandikan pesan pada penerapan metode steganografi citra dalam menyembunyikan pesan tersandi yang dihasilkan ke dalam sebuah citra warna (RGB) dalam domain Discrete Cosine Transform dengan teknik penyisipan Spread Spectrum. Hasil penelitian menunjukan bahwa kualitas dari stego image sangat mirip dengan cover citra yang digunakan, berdasarkan perolehan nilai performansi objektif PSNR diatas 30 db dan subjektif MOS di atas nilai 4.Kata kunci: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR ABSTRACTIn this study, a combination of methods was used to strengthen and enhance the security side of the process of exchanging information or digital messages. The methods used include cryptographic methods and steganography methods. The implementation of the system built is done by encoding the message on the application of the image steganography method in hiding the encrypted message generated into a color image (RGB) in the Discrete Cosine Transform domain with the Spread Spectrum insertion technique. The results of the study show that the quality of the stego image is very similar to the cover image used, based on the acquisition of an objective performance value of PSNR above 30 db and subjective MOS above a value of 4.Keywords: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR


Author(s):  
N.R. Zaynalov ◽  
U.Kh. Narzullaev ◽  
A.N. Muhamadiev ◽  
I.R. Rahmatullaev ◽  
R.K. Buranov

Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times. For example, there is a known method of hiding a written message: the slave's head was shaved, a message was written on the scalp, and after the hair grew back, the slave was sent to the addressee. From detective works, various methods of secret writing between the lines of ordinary text are well known: from milk to complex chemical reagents with subsequent processing. Digital steganography is based on hiding or embedding additional information in digital objects while causing some distortion of these objects. In this case, text, images, audio, video, network packets, and so on can be used as objects or containers. To embed a secret message, steganographic methods rely on redundant container information or properties that the human perception system cannot distinguish. Recently, there has been a lot of research in the field of hiding information in a text container, since many organizations widely use text documents. Based on this, here the MS Word document is considered as a medium of information. MS Word documents have different parameters, and by changing these parameters or properties, you can achieve data embedding. In the same article, we present steganography using invisible Unicode characters of the Space type, but with a different encoding.


Sign in / Sign up

Export Citation Format

Share Document