CFP last date
20 December 2024
Reseach Article

A New Approach of Data Hiding in Images using Cryptography and Steganography

by Pria Bharti, Roopali Soni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 18
Year of Publication: 2012
Authors: Pria Bharti, Roopali Soni
10.5120/9379-3716

Pria Bharti, Roopali Soni . A New Approach of Data Hiding in Images using Cryptography and Steganography. International Journal of Computer Applications. 58, 18 ( November 2012), 1-5. DOI=10.5120/9379-3716

@article{ 10.5120/9379-3716,
author = { Pria Bharti, Roopali Soni },
title = { A New Approach of Data Hiding in Images using Cryptography and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 18 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number18/9379-3716/ },
doi = { 10.5120/9379-3716 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:02:49.020489+05:30
%A Pria Bharti
%A Roopali Soni
%T A New Approach of Data Hiding in Images using Cryptography and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 18
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the science of using mathematics to encrypt and decrypt data and Steganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper's suspicion. A novel scheme for the embedding data in images is CrypSteg in this method combined cryptography and Steganography process in one algorithm. First we encrypt the data and then embed with image with new Steganography algorithm. The method is very efficient especially when applied to those images whose pixels are scattered homogeneously and for small data. The given image is partitioned into four level blocks, and the data will be embedded into selected the four diagonal sub-blocks values depend upon key. This algorithm only requires fewer steps and it can embed data efficiently without discarding image. Embedding 4 bits information in a 4*4 pixel block need to change very less pixels on average. Furthermore, the quality of the produced stego-images is better than that of other methods. The quality of stego-image is greatly improved when this algorithm is used.

References
  1. Yambem Jina Chanu, Kh. Manglem Singh ,Themrichon Tuithung, " Image Steganography and Steganalysis: A Survey," International Journal of Computer Applications (0975 – 8887) Volume 52– No. 2, August 2012 ,pp. 1-11 [ 2] Bhattacharyya, S. ; Khan, A. ; Nandi, A. ; Dasmalakar, A. ; Roy, S. ; Sanyal, G. ; , "Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography," Information and Communication Technologies (WICT), 2011 World Congress on , vol. , no. , pp. 36-41, 11-14
  2. Almohammad, A. ; Ghinea, G. ; Hierons, R. M. ; , "JPEG Steganography: A Performance Evaluation of Quantization Tables," Advanced Information Networking and Applications, 2009. AINA '09. International Conference on , vol. , no. , pp. 471-478, 26-29 May 2009.
  3. Abboud, G. ; Marean, J. ; Yampolskiy, R. V. ; , "Steganography and Visual Cryptography in Computer Forensics," Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth IEEE International Workshop on , vol. , no. , pp. 25-32, 20-20 May 2010.
  4. Li Zongqing; Zhang Hongbin; , "A New Data Hiding Method in Binary Images," Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on , vol. 3, no. , pp. 66-69, Aug. 30 2006-Sept. 1 2006.
  5. M. Al-Shatnawi, "A new method in image steganography with improved image quality"Appl. Math. Sci. , Vol. 6, 2012, no. 77-80, 3907-3915.
  6. Neeta, D. ; Snehal, K. ; Jacobs, D. ; , "Implementation of LSB Steganography and Its Evaluation for Various Bits," Digital Information Management, 2006 1st International Conference on , vol. , no. , pp. 173-178, 6-6 Dec. 2006.
  7. Wai Wai Zin; Than Naing Soe; , "Implementation and analysis of three steganographic approaches," Computer Research and Development (ICCRD), 2011 3rd International Conference on , vol. 2, no. , pp. 456-460, 11-13 March 2011.
  8. Bin Li; Yanmei Fang; Jiwu Huang; , "Steganalysis of Multiple-Base Notational System Steganography," Signal Processing Letters, IEEE , vol. 15, no. , pp. 493-496, 2008.
  9. Yu Qiudong; Xiao-wei Liu; , "A New LSB Matching Steganographic Method Based on Steganographic Information Table," Intelligent Networks and Intelligent Systems, 2009. ICINIS '09. Second International Conference on , vol. , no. , pp. 362-365, 1-3 Nov. 2009.
  10. Min Wu; Tang, E. ; Lin, B. ; , "Data hiding in digital binary image," Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on , vol. 1, no. , pp. 393-396 vol. 1, 2000.
  11. Yang, H. ; Kot, A. C. ; , "Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving," Multimedia, IEEE Transactions on , vol. 9, no. 3, pp. 475-486, April 2007.
  12. Hopper, N. ; von Ahn, L. ; Langford, J. ; , "Provably Secure Steganography," Computers, IEEE Transactions on , vol. 58, no. 5, pp. 662-676, May 2009.
  13. Ghoshal, N. ; Mandal, J. K. ; , "A steganographic scheme for colour image authentication (SSCIA)," Recent Trends in Information Technology (ICRTIT), 2011 International Conference on , vol. , no. , pp. 826-831, 3-5 June 2011.
  14. Hawi, T. A. ; Qutayri, M. A. ; Barada, H. ; , "Steganalysis attacks on stego-images using stego-signatures and statistical image properties," TENCON 2004. 2004 IEEE Region 10 Conference , vol. B, no. , pp. 104- 107 Vol. 2, 21-24 Nov. 2004.
  15. Johnson, N. F. ; Jajodia, S. ; , "Steganalysis: the investigation of hidden information," Information Technology Conference, 1998. IEEE , vol. , no. , pp. 113-116, 1-3 Sep 1998
  16. Khan, M. K. ; Naseem, M. ; Hussain, I. M. ; Ajmal, A. ; , "Distributed Least Significant Bit technique for data hiding in images," Multitopic Conference (INMIC), 2011 IEEE 14th International , vol. , no. , pp. 149-154, 22-24 Dec. 2011
  17. C. De Vleeschouwer, J. F. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105,Mar. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Security Data Hiding Quality Iimage