CFP last date
20 January 2025
Reseach Article

Steganography and Steganalysis through XMP

by Brijal Patel, Ritesh Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 13
Year of Publication: 2019
Authors: Brijal Patel, Ritesh Patel
10.5120/ijca2019918917

Brijal Patel, Ritesh Patel . Steganography and Steganalysis through XMP. International Journal of Computer Applications. 178, 13 ( May 2019), 43-46. DOI=10.5120/ijca2019918917

@article{ 10.5120/ijca2019918917,
author = { Brijal Patel, Ritesh Patel },
title = { Steganography and Steganalysis through XMP },
journal = { International Journal of Computer Applications },
issue_date = { May 2019 },
volume = { 178 },
number = { 13 },
month = { May },
year = { 2019 },
issn = { 0975-8887 },
pages = { 43-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number13/30612-2019918917/ },
doi = { 10.5120/ijca2019918917 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:19.861198+05:30
%A Brijal Patel
%A Ritesh Patel
%T Steganography and Steganalysis through XMP
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 13
%P 43-46
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography and cryptography are two different techniques for hide the secret data. If provide the dual data security so using the combination of both techniques such that steganography and cryptography. The cover image is encrypted through the Advanced Encryption Standard (AES) encryption with CBC mode. Encrypted data (secret data) can be hide using the Extensible Metadata Method (XMP) is performed on to the cover image. The cryptography algorithm Encrypt data with the help of a key which can be use for the authenticate purpose. Only an authenticate user can be decrypt the secret data because of the key must be same if not then data will not be decrypted. The combination of the both these algorithm will provide huge amount of security, robustness, integrity and capacity of embedding the data.

References
  1. Prashanti, G., B. V. Jyothirmai, and K. Sai Chandana. "Data confidentiality using steganography and cryptographic techniques." 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, 2017.
  2. Roy, Ratnakirti, et al. "Evaluating image steganography techniques: Future research challenges." 2013 International Conference on Computing, Management and Telecommunications (ComManTel). IEEE, 2013.
  3. Patel, Farah R., and A. N. Cheeran. "Performance Evaluation of Steganography and AES encryption based on different formats of the Image." Performance Evaluation 4.5 (2015).
  4. Rote, Geeta D., and A. M. Patil. "Steganography with Cryptography Technique for Data Hiding." International Journal of Science and Research (IJSR) (2013).
  5. Chanu, Yambem Jina, Kh Manglem Singh, and Themrichon Tuithung. "Image steganography and steganalysis: A survey." International Journal of Computer Applications 52.2 (2012).
  6. Abikoye, O. C., K. S. Adewole, and A. J. Oladipupo. "Efficient data hiding system using cryptography and steganography." (2012).
  7. Varsha, Rajender S. "Data Hiding Using Steganography and Cryptography." International Journal of Computer Science and Mobile Computing 4.4 (2015): 802-805.
  8. Wu, Hao-tian, and Jiwu Huang. "Secure JPEG steganography by LSB+ matching and multi-band embedding." 2011 18th IEEE International Conference on Image Processing. IEEE, 2011.
  9. Behera, Sanjeeb Kumar, and Minati Mishra. "Steganography--A Game of Hide and Seek in Information Communication." arXiv preprint arXiv:1604.00493 (2016).
  10. Ball, Alex, and Mansur Darlington. "Briefing Paper: The Adobe eXtensible Metadata Platform (XMP)." UKOLN research organization (2007).
  11. Kaur, Navneet, and Sunny Behal. "A Survey on various types of Steganography and Analysis of Hiding Techniques." International journal of engineering trends and technology 11.8 (2014): 388-392.
  12. Seyyedi, Seyyed Amin, and Rauf Kh Sadykhov. "Digital Image Steganography Concept and Evaluation." International Journal of Computer Applications 66.5 (2013).
  13. Gasiorowski-Denis, Elizabeth. "Adobe Extensible Metadata Platform (XMP) becomes an ISO standard." (2016).
  14. Park, Hyung Ju, Kwang Yeol Park, and Dong Hwan Har. "Identification of digital images with the Adobe™ eXtensible Metadata Platform." Archiving Conference. Vol. 2008. No. 1. Society for Imaging Science and Technology, 2008.
  15. Ge, Huayong, Mingsheng Huang, and Qian Wang. "Steganography and steganalysis based on digital image." 2011 4th International Congress on Image and Signal Processing. Vol. 1. IEEE, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography AES Encryption Standard Extensible Metadata Platform