The rapid development in technology has had a great influence on the exchange of information. In this modern era, maintaining security during informationexchanges is essential. There are many algorithms were used to ensure the exchanged data is confidential, with examples being cryptography and steganography. In this paper, we present a combined of bit matching steganography and Advanced Encryption System (AES) cryptography are used to improve the security of the exchanged data. Bit matching steganography has advantages in terms of payload capacity and image quality. The bit matching algorithm presented here is capable of finding the location of matching pixels and creates a key to retrieve the secret message. The AES algorithm is secure standard cryptographythatensures security of the generated key from attack. The proposed method utilizes the entire color channel to find the bit matching and then encrypts the key generated from the bit matching method before sending it to a receiver. Experimental results show that the proposed method has higher speed, an undistorted image, and unlimited payload capacity when compared with other popular steganography algorithms. Moreover, the proposed method also provides security against statistical steganalysis.
Steganography Cryptography Encryption Advanced encryption system Information hiding Exact matching algorithm Image,Secret message LSB And key-dependent data technique
This is a preview of subscription content, log in to check access.
We are grateful to Miss. Rasha S. Ali for proof reading and making corrections to this article. Without her support, it would have not been possible to submit this in the current form.
Abdelmgeid AA, Tarek AA, Al-HussienSeddik S, Shaimaa MH (2016) New image steganography method using zero order hold zooming. International Journal of Computer Applications 133:27–31Google Scholar
Alamsyah MMA, Prasetiyo B (2015) Data hiding security using bit matching-based steganography and cryptography without change the stego image quality. Journal of theoretical and applied information technology 106–112Google Scholar
Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert systems with applications 293–306CrossRefGoogle Scholar
Al-rahal M, Sen AA, Basuhil AA (2016) High level security based steganoraphy in image and audio files. Journal of theoretical and applied information technology 29–37Google Scholar
Alsarayreh MA, Alia MA, Maria KA (2017) A novel image steganographic system based onexact matching algorithm and key-dependent data technique. Journal of theoretical and applied information technology 1212–1224Google Scholar
Chen WJ, Chang CC, Le TH (2010) High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications, 3292–3301CrossRefGoogle Scholar
EL-Emam NN (2007) Hiding a large amount of data with high security using steganography algorithm. Journal of computer science 223–232CrossRefGoogle Scholar
Eng PMKM, Abdulhameed Z (2014) High capacity steganography based on chaos and contourlet transform for hiding multimedia data. Int J Electron CommEngTechnol (IJECET) 5:26–42Google Scholar
Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlettransform. J Electron Imaging 22:043007CrossRefGoogle Scholar
Jung KH, Yoo KY (2014) Data hiding using edge detector for scalable images. Multimedia Tools and Application 1455–1468CrossRefGoogle Scholar
Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications 6123–6130CrossRefGoogle Scholar
Mohamed MH, Mohamed LM (2016) High capacity image steganography technique based on LSB substitution method, Applied Mathematics & Information Sciences. Appl Math Inf Sci 10(1):259–266MathSciNetCrossRefGoogle Scholar
Muhammad K, Sajjad M, Mehmood I, Rho S, and Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 14867–14893CrossRefGoogle Scholar
Nguyen TD, Arch-int S, Arch-int N (2015) A novel secure block data-hiding algorithm using cellular automata to enhance the performance of JPEG steganography. Multimedia tools and applications 5661–5682CrossRefGoogle Scholar
Nguyen TD, Arch-int S, Arch-int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia tools and applications 8319–8345CrossRefGoogle Scholar
Parah SA, Sheikh JA, Hafiz AM, Bhat G (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40:70–82CrossRefGoogle Scholar