Skip to main content

Enhancing the Security and Quality of Image Steganography Using a Novel Hybrid Technique

  • Conference paper
  • First Online:
Smart Trends in Information Technology and Computer Communications (SmartCom 2016)

Abstract

Steganography is a technique of hiding the private messages inside the cover image. The main objective of steganography is to send information or message in hidden manner from source to destination in such a way that the intruder or attacker cannot crack the contents of the message and even would be unable to feel the presence of secret message. The proposed method introduced as a new hybrid security model based on steganography. AES algorithm with chaos function to encrypt secret message on first level has been used and RSA algorithm to encrypt secret message on second level have been used. LSB technique is used to hide encrypted message into cover medium. The proposed technique is tested on various images. The PSNR value is calculated for better picture quality of stego image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Manjunath, N., Hiremath, S.G.: Image and text steganography based on RSA and chaos cryptography. Algorithm Hash LSB Tech. IJEECS 3(5) (2015) ISSN: 2347-2820

    Google Scholar 

  2. Ramaiya, M.K., Hemrajani, N., Saxena, A.K.: Security Improvisation in Image. Steganography using DES, IEEE (2012)

    Google Scholar 

  3. Yang, R., Zheng, Z., Tao, S., Ding, S.: Image: steganography combined with DES encryption pre-processing. In: IEEE 6th International Conference on Measuring Technology and Mechatronics Conference, pp. 323–326 (2014)

    Google Scholar 

  4. Mishra, M., Tiwari, G., Yadav, A.K.: Secret Communication using Public key Steganography. IEEE (2014)

    Google Scholar 

  5. Devi, M., Sharma, N.: Improved Detection of Least Significant Bit Steganography Algorithms in Color and Gray Scale Images, IEEE UIET panjab university Chandigarh (2014)

    Google Scholar 

  6. Vitthal, S., Bhosale Rajkumar, S., Panhalkar Archana, R.: A Novel Security Scheme for Secret Data using Cryptography and Steganography. IJCNIS (2012)

    Google Scholar 

  7. Enayatifar, R., Mahmoudi, F., Mirzaei, K.: Using the Chaotic Map in Image Steganography. In: IEEE Computer Society- International Conference on Information Technology and Management, pp. 491–495 (2009)

    Google Scholar 

  8. Dagar, S.: RGB based dual key image steganography (IEEE Electronic Library), pp. 316–320. IEEE (2013)

    Google Scholar 

  9. Alam, S., Kumar, V., Siddiqui, W.A., Ahmad, M.: Key dependent image steganography using edge detection. In: IEEE Fourth International Conference on Advanced Computing & Communication Technologies, pp. 85–88 (2014)

    Google Scholar 

  10. Akhtar, N., Johri, P., Khan, S.: Enhancing the security and quality of LSB based image steganography. In: IEEE 5th International Conference on Computational Intelligence and Communication Network, pp. 385–390 (2013)

    Google Scholar 

  11. Masud Karim, S.M., Rahman, S., Hossain, I.: A new approach for LSB based image steganography using secret key. IEEE ICCIT (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Trapti Ozha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Verma, V., Ozha, T. (2016). Enhancing the Security and Quality of Image Steganography Using a Novel Hybrid Technique. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_80

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3433-6_80

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3432-9

  • Online ISBN: 978-981-10-3433-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics