scholarly journals A Survey of Different Steganography Technique using Cryptographic Algorithm

2018 ◽  
Vol 7 (2) ◽  
pp. 40-43
Author(s):  
Prakhar Agrawal ◽  
Arvind Upadhyay

Steganography and cryptography are two major aspects of data security . In this paper we are going to provide the survey of different techniques of LSB based Steganography that used cryptography algorithms to secure sensitive information. Steganography is used to hide data and Cryptography is used to encrypt the data. Although cryptography and steganography individually can provide data security, every of them has a drawback. Drawback associated with Cryptography is that, the cipher text looks meaningless, so the unintended user can interrupt the transmission or make more careful checks on the information from the sender to the receiver. Drawback associated with Steganography is that when the presence of hidden information is revealed or even suspected, the message is become known[1].By combining these two methods we can solve both of the above problem. First we encrypt the data using any cryptography technique and then embed the encrypted text into the image. Steganography is the process which hides the presence of secure data during communication. On the other hand cryptography is encrypting and decrypting of secure data and information with a secrete key so that no one can be understand the message directly.

2018 ◽  
Vol 7 (1) ◽  
pp. 93-98
Author(s):  
Prakhar Agrawal ◽  
Arvind Upadhyay

The craft of data stowing away has gotten much consideration in the ongoing years as security of data has turned into a major worry in this web time. As sharing of delicate data by means of a typical correspondence channel have become inevitable, Steganography techniques aimed at secretly hiding data in a multimedia carrier such as text, audio, image or video, without raising any suspicion of alteration to its contents. The original carrier is referred to as the cover object. In this paper, we proposed a mechanism of end user data security by means of image steganography technique using ECDH (Elliptic Curve Diffie–Hellman) algorithm for improving image quality while we hide data in image. Our proposed approach is simplified yet efficient algorithm that can be implemented for end user application that strictly enforces the data integrity over the communication channel. The performance of the proposed approach is measured in terms of time, memory, MSE and PSNR which was better improved from the previous approach in the similar parameters.


Author(s):  
Kavia .

Cryptography and Steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known . According to my proposed work in which both steganography and cryptography are combine and give good security for data. Firstly, the encrypted images has been hidden using image steganography method. Secondly, the Hash function algorithm has been modified and used to encrypt the stego image by using 128 digit hexa-key. Therefore, two levels of security have been provided using the proposed technique. In addition, the proposed technique provides high embedding capacity and better quality stego images.


JURTEKSI ◽  
2021 ◽  
Vol 7 (2) ◽  
pp. 133-142
Author(s):  
Alwin Fau ◽  
Fince Tinus Waruwu

Abstract: In today's technological developments, digital images are a medium that is often used to store a person's identity. Digital images are currently widely used for data security needs. On the other hand, images can also be used as a medium for tapping data. Today's digital media provide many things in manipulating and changing the information contained in these images. In this study, the authors conducted a study to examine similarities in digital images so that it could be seen whether the information was authentic or not. detecting image similarities can help find out information whether the image is the same as the original object or not. The method used in this research is the Eigen Face method. The face eigen method is a method that can be used to check and match the similarities of an image. With the eigenface value, Figure 1, Figure 2, Figure 3, it can be determined that with other eigenface values can be determined based on the eigenface matrix values obtained from each image. Based on the values obtained from Figures 1, 2, and 3, it can be concluded that the eigenface method is able to present facial similarities with a presentation value of 80%.            Keywords: Eigenface; Face Recognation; Images; Images Processing  Abstrak: Dalam perkembangan teknologi saat ini, gambar digital merupakan media yang sering digunakan untuk menyimpan identitas seseorang. Gambar digital saat ini banyak digunakan untuk kebutuhan keamanan data. di sisi lain, gambar juga dapat digunakan sebagai media penyadapan data. Media digital saat ini menyediakan banyak hal dalam memanipulasi dan mengubah informasi yang terdapat pada gambar tersebut. Dalam penelitian ini penulis melakukan penelitian untuk menelaah kemiripan pada citra digital sehingga dapat diketahui apakah informasi tersebut otentik atau tidak. Mendeteksi kemiripan citra dapat membantu mengetahui informasi apakah citra tersebut sama dengan objek aslinya atau tidak. Metode yang digunakan dalam penelitian ini adalah metode Eigen Face. Metode eigen wajah merupakan metode yang dapat digunakan untuk mengecek dan mencocokkan kemiripan suatu citra. Dengan nilai eigenface, Gambar 1, Gambar 2, Gambar 3, dapat ditentukan bahwa dengan nilai eigenface lainnya dapat ditentukan berdasarkan nilai matriks eigenface yang diperoleh dari masing-masing citra. Berdasarkan nilai yang diperoleh dari Gambar 1, 2, dan 3, dapat disimpulkan bahwa metode eigenface mampu menghadirkan kemiripan wajah dengan nilai presentasi 80%.. Kata kunci: Citra; Eigenface; Pengolahan Citra Digital; Pengenalan Wajah


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 100-110
Author(s):  
Ahmad Arif ◽  
Adidtya Perdana ◽  
Arief Budiman

Data security is most important today, because the rampant data theft resulting in a lot of misuse of data by irresponsible parties so that it makes us anxious as data owners, for data storage it is usually stored in the database. From these problems the idea emerged to create a cryptographic system where the system can secure data by encrypting and decrypting also make data fully save and then the data owned by the user. This study aims to secure the data in the database by encrypting the original data without destroying the original data when later after decrypted. To perform this security, a cryptographic methodology is used with both of  method that is Vigenere Cipher and Triangle Chain Cipher algorithms which are implemented in the application because both of methodology have same root that is classical cryptographic. This application will later be used as a medium for users to secure their data in the database so that later data theft will not to be easy. After doing fully research that produces applications that can implement combination of Vigenere Cipher and Triangle Chain Cipher algorithms,data in the encrypted database field is safe because encryption has been done to the data.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1906
Author(s):  
Hyeokjoon Kweon ◽  
Jinsun Park ◽  
Sanghyun Woo ◽  
Donghyeon Cho

In this paper, we propose deep multi-image steganography with private keys. Recently, several deep CNN-based algorithms have been proposed to hide multiple secret images in a single cover image. However, conventional methods are prone to the leakage of secret information because they do not provide access to an individual secret image and often decrypt the entire hidden information all at once. To tackle the problem, we introduce the concept of private keys for secret images. Our method conceals multiple secret images in a single cover image and generates a visually similar container image containing encrypted secret information inside. In addition, private keys corresponding to each secret image are generated simultaneously. Each private key provides access to only a single secret image while keeping the other hidden images and private keys unrevealed. In specific, our model consists of deep hiding and revealing networks. The hiding network takes a cover image and secret images as inputs and extracts high-level features of the cover image and generates private keys. After that, the extracted features and private keys are concatenated and used to generate a container image. On the other hand, the revealing network extracts high-level features of the container image and decrypts a secret image using the extracted feature and a corresponding private key. Experimental results demonstrate that the proposed algorithm effectively hides and reveals multiple secret images while achieving high security.


Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1490
Author(s):  
Gergely Márk Csányi ◽  
Dániel Nagy ◽  
Renátó Vági ◽  
János Pál Vadász ◽  
Tamás Orosz

Data sharing is a central aspect of judicial systems. The openly accessible documents can make the judiciary system more transparent. On the other hand, the published legal documents can contain much sensitive information about the involved persons or companies. For this reason, the anonymization of these documents is obligatory to prevent privacy breaches. General Data Protection Regulation (GDPR) and other modern privacy-protecting regulations have strict definitions of private data containing direct and indirect identifiers. In legal documents, there is a wide range of attributes regarding the involved parties. Moreover, legal documents can contain additional information about the relations between the involved parties and rare events. Hence, the personal data can be represented by a sparse matrix of these attributes. The application of Named Entity Recognition methods is essential for a fair anonymization process but is not enough. Machine learning-based methods should be used together with anonymization models, such as differential privacy, to reduce re-identification risk. On the other hand, the information content (utility) of the text should be preserved. This paper aims to summarize and highlight the open and symmetrical problems from the fields of structured and unstructured text anonymization. The possible methods for anonymizing legal documents discussed and illustrated by case studies from the Hungarian legal practice.


Author(s):  
Musthofa Galih Pradana ◽  
Pujo Hari Saputro ◽  
Bondan Wahyu Pamekas

<br /><em>Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic cryptographic algorithms that need to be modified so that they become more optimal in the data security process. The first modification is to modify the Vigenere key using Fibonacci. In general, Vigenere Cipher will repeat the same keyword to complete the number of characters that are lacking so that the number of characters is the same as the number of characters in the plaintext. The second modification is to change or convert plaintext letters into ASCII letters so that the code is more difficult to solve. After the ASCII conversion process is done, the next results will be converted back in Hexa letters. In addition to the two modifications made, the steganography technique is also added by hiding the code behind the media in the form of images. Images that are sampled will be renamed and stored in different places.</em>


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Virdyra Tasril

The development of computer and telecommunications technology has experienced the significant change inprogress. It can be seen that technology has become a necessity because technological advances can accomplishtasks quickly, accurately, and efficiently. In line with the development of these technologies, it increasinglychanges the way people communicate. There needs to be security protection to protect data from the threat ofwild parties. Cryptography is the right method to secure data. One method that can be used is the AdvancedEncryption Standard (AES). This method is an excellent classical cryptographic algorithm that can be used toidentify data. AES algorithm is a symmetric ciphertext block that can encrypt and decrypt information quickly.Encryption changes data that can no longer be read called ciphertext; instead, decryption is changing theciphertext data into the original form that we know as plaintext. The AES algorithm has several key modelssuch as 128, 192, and 256 bits to encrypt and decrypt data on 128-bit message blocks. This study uses a 128-bitkey. AES encryption results can be trusted as one of the fast and powerful encryption methods.


2019 ◽  
Vol 8 (3) ◽  
pp. 6930-6935

Big Data (BD) generation are exponentially increased and it is necessarily required for modern society. Hadoop Clusters (HC) provides the facilities like Processing, storage and doesn’t have built-in security. But this feature is important as it increases the analysis speed, storage process. HC facilitates storage, processing of data, on the other hand processing of streaming data handled by the Apache Spark. However data storage, processing power, cluster management and data security in HC is not reached up to the mark with increased data. In such situations, HC are scaled out from small scale IT organization and it depends on public cloud centers with lack of data security, communication, computation and operational cost. On the other hand data security in HC is major issue and it uses a separat security mechanisms. This paper proposes New Algorithm Built in Authentication Based on Access (BABA) as a security instance integrated as Hadoop instance for securing data in HC from attackers along with metadata security for avoiding crashes Hadoop. This mechanism provides a secured HC without using other security configurations which will reduce operational cost, computational power, increases data security and providing a better solution for HC.


Sign in / Sign up

Export Citation Format

Share Document