Abstract
In digital communication secure communication sessions must be provided. The data transmitted across the global network should be more secure so that any Intruder can’t interpret the data. To improve the security features in case of data transmission and data hiding Cryptography and Steganography are the two popular methods. In this paper, we are presenting the combination of Cryptography and Steganography techniques in one system. Our approach is to develop a new technique to encrypt secret information to cipher text and hide it into an image, with the benefits of combining cryptography and steganography. Firstly, the message is encrypted by using a Secret key and XOR its with the main text using binary representation. After that, we performed Steganography. Some modifications are done on LSB algorithm by adding a sequence algorithm for pixel selection. Results we get indicate that our proposed work is encouraging in terms of robustness and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Phadte, R.S., Dhanaraj, R.: Enhanced blend of image steganography and cryptography. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC) (2017). https://doi.org/10.1109/ICCMC.2017.8282682
Usha, S., Kumar, G.A.S., Boopathybagan, K.: A secure triple level encryption methodusing cryptography and steganography. In: International Conference on Computer Science and Network Technology (ICCSNT), vol. 2, no. 2(11), pp. 1017–1020. IEEE (2011)
Marwaha, P.: Visual cryptographic steganography in images. In: International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–6. IEEE (2010)
Maurya, S., Shrivastava, V.: An improved novel steganographic technique for RGB and YCbCr colorspace. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(5), 377–381 (2014)
Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R., Shamsuddin, M.Z.I.: Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia. IEEE (2003)
Han, L.C., Mahyuddin, N.M.: An implementation of caesar cipher and XOR encryption technique in a secure wireless communication. In: 2014 2nd International Conference on Electronic Design (ICED) (2014). https://doi.org/10.1109/ICED.2014.7015781
Kumar, K., Ghosh, S., Sahana, S.: Secret key based string reverse enabling user level encryption technique for data security. Int. J. Adv. Res. Comput. Sci. http://dx.doi.org/10.26483/ijarcs.v9i2.5883
Sahana, S., Bose, R., Sarddar, D.: Harnessing RAID mechanism for enhancement of data storage and security on cloud (2016) https://doi.org/10.1186/s40552-016-0024-5
Sahana, S., Pal, A., Chakroborty, A.: Optimized block steganography based crypt encryption for secured data transfer. In: 3rd International Conference on Computing, Communication and Sensor Network (CCSN) (2013)
Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB images. In: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (2015). https://doi.org/10.1109/ICECCT.2015.7226122
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Roy, A., Bhattacharya, J., Kundu, S., Sahana, S., Singh, D. (2020). Block Steganography Based Secure Key Encryption to Improve Data Security. In: Dawn, S., Balas, V., Esposito, A., Gope, S. (eds) Intelligent Techniques and Applications in Science and Technology. ICIMSAT 2019. Learning and Analytics in Intelligent Systems, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-030-42363-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-42363-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42362-9
Online ISBN: 978-3-030-42363-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)