Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 23, pp 32721–32734 | Cite as

Implementation of cryptography in steganography for enhanced security

  • Harianto Antonio
  • P. W. C. PrasadEmail author
  • Abeer Alsadoon
Article
  • 96 Downloads

Abstract

The rapid development in technology has had a great influence on the exchange of information. In this modern era, maintaining security during informationexchanges is essential. There are many algorithms were used to ensure the exchanged data is confidential, with examples being cryptography and steganography. In this paper, we present a combined of bit matching steganography and Advanced Encryption System (AES) cryptography are used to improve the security of the exchanged data. Bit matching steganography has advantages in terms of payload capacity and image quality. The bit matching algorithm presented here is capable of finding the location of matching pixels and creates a key to retrieve the secret message. The AES algorithm is secure standard cryptographythatensures security of the generated key from attack. The proposed method utilizes the entire color channel to find the bit matching and then encrypts the key generated from the bit matching method before sending it to a receiver. Experimental results show that the proposed method has higher speed, an undistorted image, and unlimited payload capacity when compared with other popular steganography algorithms. Moreover, the proposed method also provides security against statistical steganalysis.

Keywords

Steganography Cryptography Encryption Advanced encryption system Information hiding Exact matching algorithm Image,Secret message LSB And key-dependent data technique 

Notes

Acknowledgements

We are grateful to Miss. Rasha S. Ali for proof reading and making corrections to this article. Without her support, it would have not been possible to submit this in the current form.

References

  1. 1.
    Abdelmgeid AA, Tarek AA, Al-HussienSeddik S, Shaimaa MH (2016) New image steganography method using zero order hold zooming. International Journal of Computer Applications 133:27–31Google Scholar
  2. 2.
    Alamsyah MMA, Prasetiyo B (2015) Data hiding security using bit matching-based steganography and cryptography without change the stego image quality. Journal of theoretical and applied information technology 106–112Google Scholar
  3. 3.
    Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert systems with applications 293–306CrossRefGoogle Scholar
  4. 4.
    Al-rahal M, Sen AA, Basuhil AA (2016) High level security based steganoraphy in image and audio files. Journal of theoretical and applied information technology 29–37Google Scholar
  5. 5.
    Alsarayreh MA, Alia MA, Maria KA (2017) A novel image steganographic system based onexact matching algorithm and key-dependent data technique. Journal of theoretical and applied information technology 1212–1224Google Scholar
  6. 6.
    Chen WJ, Chang CC, Le TH (2010) High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications, 3292–3301CrossRefGoogle Scholar
  7. 7.
    EL-Emam NN (2007) Hiding a large amount of data with high security using steganography algorithm. Journal of computer science 223–232CrossRefGoogle Scholar
  8. 8.
    Eng PMKM, Abdulhameed Z (2014) High capacity steganography based on chaos and contourlet transform for hiding multimedia data. Int J Electron CommEngTechnol (IJECET) 5:26–42Google Scholar
  9. 9.
    Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlettransform. J Electron Imaging 22:043007CrossRefGoogle Scholar
  10. 10.
    Jung KH, Yoo KY (2014) Data hiding using edge detector for scalable images. Multimedia Tools and Application 1455–1468CrossRefGoogle Scholar
  11. 11.
    Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications 6123–6130CrossRefGoogle Scholar
  12. 12.
    Mohamed MH, Mohamed LM (2016) High capacity image steganography technique based on LSB substitution method, Applied Mathematics & Information Sciences. Appl Math Inf Sci 10(1):259–266MathSciNetCrossRefGoogle Scholar
  13. 13.
    Muhammad K, Sajjad M, Mehmood I, Rho S, and Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 14867–14893CrossRefGoogle Scholar
  14. 14.
    Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stegokey-directed adaptive LSB substitution method. Multimed Tools Appl:8597–8626.  https://doi.org/10.1007/s11042-016-3383-5 CrossRefGoogle Scholar
  15. 15.
    Nguyen TD, Arch-int S, Arch-int N (2015) A novel secure block data-hiding algorithm using cellular automata to enhance the performance of JPEG steganography. Multimedia tools and applications 5661–5682CrossRefGoogle Scholar
  16. 16.
    Nguyen TD, Arch-int S, Arch-int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia tools and applications 8319–8345CrossRefGoogle Scholar
  17. 17.
    Parah SA, Sheikh JA, Hafiz AM, Bhat G (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40:70–82CrossRefGoogle Scholar
  18. 18.
    Sabeti V, Samavi S, Shirani S (2013) An adaptive LSB matching steganography based on octonary complexity measure. Multimedia Tools and Application:777–793.  https://doi.org/10.1007/s11042-011-0975-y CrossRefGoogle Scholar
  19. 19.
    Sun S (2016) A novel edge based image steganography with 2kcorrection and Huffman encoding. Information Processing Letters 93–99MathSciNetCrossRefGoogle Scholar
  20. 20.
    Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 671–683CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Charles Sturt University – Sydney CampusSydneyAustralia

Personalised recommendations