Skip to main content

Block Steganography Based Secure Key Encryption to Improve Data Security

  • Conference paper
  • First Online:
Intelligent Techniques and Applications in Science and Technology (ICIMSAT 2019)

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 12))

Abstract

In digital communication secure communication sessions must be provided. The data transmitted across the global network should be more secure so that any Intruder can’t interpret the data. To improve the security features in case of data transmission and data hiding Cryptography and Steganography are the two popular methods. In this paper, we are presenting the combination of Cryptography and Steganography techniques in one system. Our approach is to develop a new technique to encrypt secret information to cipher text and hide it into an image, with the benefits of combining cryptography and steganography. Firstly, the message is encrypted by using a Secret key and XOR its with the main text using binary representation. After that, we performed Steganography. Some modifications are done on LSB algorithm by adding a sequence algorithm for pixel selection. Results we get indicate that our proposed work is encouraging in terms of robustness and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Phadte, R.S., Dhanaraj, R.: Enhanced blend of image steganography and cryptography. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC) (2017). https://doi.org/10.1109/ICCMC.2017.8282682

  2. Usha, S., Kumar, G.A.S., Boopathybagan, K.: A secure triple level encryption methodusing cryptography and steganography. In: International Conference on Computer Science and Network Technology (ICCSNT), vol. 2, no. 2(11), pp. 1017–1020. IEEE (2011)

    Google Scholar 

  3. Marwaha, P.: Visual cryptographic steganography in images. In: International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–6. IEEE (2010)

    Google Scholar 

  4. Maurya, S., Shrivastava, V.: An improved novel steganographic technique for RGB and YCbCr colorspace. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(5), 377–381 (2014)

    Google Scholar 

  5. Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R., Shamsuddin, M.Z.I.: Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia. IEEE (2003)

    Google Scholar 

  6. Han, L.C., Mahyuddin, N.M.: An implementation of caesar cipher and XOR encryption technique in a secure wireless communication. In: 2014 2nd International Conference on Electronic Design (ICED) (2014). https://doi.org/10.1109/ICED.2014.7015781

  7. Kumar, K., Ghosh, S., Sahana, S.: Secret key based string reverse enabling user level encryption technique for data security. Int. J. Adv. Res. Comput. Sci. http://dx.doi.org/10.26483/ijarcs.v9i2.5883

  8. Sahana, S., Bose, R., Sarddar, D.: Harnessing RAID mechanism for enhancement of data storage and security on cloud (2016) https://doi.org/10.1186/s40552-016-0024-5

  9. Sahana, S., Pal, A., Chakroborty, A.: Optimized block steganography based crypt encryption for secured data transfer. In: 3rd International Conference on Computing, Communication and Sensor Network (CCSN) (2013)

    Google Scholar 

  10. Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB images. In: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (2015). https://doi.org/10.1109/ICECCT.2015.7226122

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudipta Sahana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Roy, A., Bhattacharya, J., Kundu, S., Sahana, S., Singh, D. (2020). Block Steganography Based Secure Key Encryption to Improve Data Security. In: Dawn, S., Balas, V., Esposito, A., Gope, S. (eds) Intelligent Techniques and Applications in Science and Technology. ICIMSAT 2019. Learning and Analytics in Intelligent Systems, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-030-42363-6_6

Download citation

Publish with us

Policies and ethics