Skip to main content

Enhanced Image Steganography Technique Using Cryptography for Data Hiding

  • Conference paper
  • First Online:
New Approaches for Multidimensional Signal Processing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 216))

  • 285 Accesses

Abstract

The fast improvement of the Web has expanded the simplicity of sharing data to individuals around the world. In any case, this headway additionally raises a trouble about information control when the data is transferred by the sender to the beneficiary. Along these lines, data security is a significant issue in information correspondence. Steganography and cryptography assume significant jobs in the field of data security. Steganography can be applied, however, a different computerized media, for example, video, pictures, and sound to cover data in such a manner that nobody else realizes that there is a secret data. Cryptography alludes to the specialty of changing over a plaintext (message) into an ambiguous organization. Both steganography and cryptography strategies are strong. The contents obtained after doing so is secret and its existence is also hidden. This method is tested and it is observed that it prevents steganalysis too as well as parameters like PSNR and MSE are also tested which gave good results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Islam, A., Khalid, F., Shah, M., Khan, Z., Mahmood, T., Khan, A., Ali, U., Naeem, M.: An improved image steganography technique based on MSB using bit differencing. In: The Sixth International Conference on Innovative Computing Technology, pp. 265–269. IEEE, Dublin (2016)

    Google Scholar 

  2. McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C.: Integration of biometrics and steganography: a comprehensive review. Technologies 7, 34 (2019)

    Article  Google Scholar 

  3. Zou, Y., Zhang, G., Liu, L.: Research on image steganography analysis based on deep learning. J. Vis. Commun. Image Represent. 60, 266–275 (2019)

    Article  Google Scholar 

  4. Muhajjar, A.R., Badr, F.A.: Secure data communications using cryptography and IPv6 steganography. Int. J. Eng. Technol. 7(4.19), 624–628 (2018)

    Google Scholar 

  5. Wu, N., Fan, P., Yang, Z., Ma, W., Liu, H.: Research on coverless text steganography based on single bit rules. J. Phys. Conf. Series 1237 (2019)

    Google Scholar 

  6. Ali, U.A., Sohrawordi, M., Uddin, M.: A robust and secured image steganography using LSB and random bit substitution. Am. J. Eng. Res. 8(2), 39–44 (2019)

    Google Scholar 

  7. Thabit, R.: Improved steganography techniques for different types of secret data. Int. J. Adv. Syst. Sci. Appl. 6, 38–51 (2019)

    Google Scholar 

  8. Verma, M., Saini, H.: Analysis of various techniques for audio steganography in data security. Int. J. Sci. Res. Netw. Secur. Commun. 7(2), 1–5 (2019)

    Google Scholar 

  9. Kalamkar, P., Gaikwad, M., Gore, S., Sonule, D., Bodhe, V.: A review on implementation visual cryptography and steganography. Int. J. Sci. Res. Sci. Technol. 6(2), 420–428 (2019)

    Google Scholar 

  10. Sharma, A., Poriye, M., Kumar, V.: A secure steganography technique using MSB. Int. J. Emerg. Res. Manag. Technol. 6(6) (2017)

    Google Scholar 

  11. Miramirkhani, F., Narmanlioglu, O., Uysal, M., Panayirci, E.: A mobile channel model for VLC and application to adaptive system design. IEEE Commun. Lett. 21(5), 1035–1038 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This work is part of bilateral Indian-Bulgarian cooperation research project between Technical University of Sofia, Bulgaria and Deenbandhu Chhotu Ram University of Science and Technology, Murthal, Sonipat, India under the title “Contemporary Approaches for Processing and Analysis of Multidimensional Signals in Telecommunications,” financed by the Department of Science and Technology (DST), India and the Ministry of Educations and Science, Bulgaria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jasvinder Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, J., Sharma, S. (2021). Enhanced Image Steganography Technique Using Cryptography for Data Hiding. In: Kountchev, R., Mironov, R., Li, S. (eds) New Approaches for Multidimensional Signal Processing. Smart Innovation, Systems and Technologies, vol 216. Springer, Singapore. https://doi.org/10.1007/978-981-33-4676-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-4676-5_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-4675-8

  • Online ISBN: 978-981-33-4676-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics