Advertisement

Secure Data Transmission Through Steganography with Blowfish Algorithm

  • K. VengatesanEmail author
  • Abhishek Kumar
  • Tusar Sanjay Subandh
  • Rajiv Vincent
  • Samee Sayyad
  • Achintya Singhal
  • Saiprasad Machhindra Wani
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

The Steganography is a strategy for thumping mystery communications in a shelter protest while correspondence happens among dispatcher and collector. Safety of mystery or vital data has dependably be noteworthy issues after the previous occasions to the right period. It will be dependably with the attentive subject for specialists to create secured methods to sends information deprived of uncovering it to anybody further than the collector. In this way from everyday analysts have created numerous methods to satisfy secure exchange of information with Steganography is one of them. Here we have built up another method of photo Steganography privileged the inserting the encoded Data document or information utilizing RSA algorithm with Hash-LSB for giving greater safety to information with in addition this information hiding strategy. The created technique utilizes a hash capacity to produce an example for hide information bits into LSB of RGB pixel estimations of the convey images. This method ensures with the data-set has been encoded before implanting it into a convey image. Implanted content in images generally conveys vital message around the substance, in the event that the any cases outsider get the message such a significant number of ways, so keep this activity this paper actualizes hash table encryption to the message at that point cover up addicted to the images motive is to give extra secured approach to exchange information. This work is another method for hide the data in a photo and minimum variety in the photo bits has been made, that create this method secured with more proficient. In the method additionally connected a cryptography strategy. Other stage is to encode and unscramble stenographic images utilizing blowfish algorithm, this activity utilized to deal with other series of security procedure usage.

Keywords

Steganography Image processing Secure transmission 

References

  1. 1.
    Sinha, A., Singh, K.: A technique for image encryption using digital signature. Source: Opt. Commun. 218(4), 229–234 (2003)Google Scholar
  2. 2.
    Al-Husainy, M.A.F.: Image encryption using genetic algorithm. J. Inf. Technol. 5(3), 516–519 (2006)CrossRefGoogle Scholar
  3. 3.
    Younes, M.A.B., Jantan, A.: Image encryption using block-based transformation algorithm. IAENG Int. J. Comput. Sci. 35(1), 15–23 (2008)Google Scholar
  4. 4.
    Chang, K., Jung, C., Lee, S. and Yang, W.: High quality perceptual steganographic techniques, vol. 2939, pp. 518–531. Springer (2004)Google Scholar
  5. 5.
    Fraz, E.: Steganography preserving statistical properties. In: Proceeding of the 5th Internationally Workshop on Information Hiding. LNCS, Noordwijkerhout, The Netherlands, October 2002, vol. 2578, pp. 278–294. Springer (2003)Google Scholar
  6. 6.
    Kessler, G.C.: Steganography: hiding data within data. An edited version of this paper with the title “Hiding Data in Data,” originally appeared in the April 2002 issue of Windows &.NET Magazine, September 2001Google Scholar
  7. 7.
    El-din, H., Ahmed, H., Hamdy, M.K., Farag Allah, O.S.: Encryption quality analysis of the RC5 block cipher algorithm for digital images. Opt. Eng. 45(10107003), 7 (2006)Google Scholar
  8. 8.
    Kathryn, H.: A Java steganography tool 24 March 2005. http://diit.sourceforge.net/files/Proposal.pdf
  9. 9.
    Zenon, H., Sviatoslav, V., Yuriy, R.: Cryptography and steganography of video information in modern communications (1998). Citeseer.ist.psu.edu/hrytskiv98cryptography.htmlGoogle Scholar
  10. 10.
    Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Inst. of Image Process. Xi’an Jiaotong University, Shaanxi, This paper appears in: Circuits and Systems, ISCAS 2002. IEEE International Symposium 2002, vol. 2, pp. 708–711 (2002)Google Scholar
  11. 11.
    Saravana Kumar, E., Vengatesan, K.: Cluster Comput. (2018).  https://doi.org/10.1007/s10586-018-2362-1CrossRefGoogle Scholar
  12. 12.
    Sanjeevikumar, P., Vengatesan, K., Singh, R.P., Mahajan, S.B.: Statistical analysis of gene expression data using biclustering coherent column. Int. J. Pure Appl. Math. 114(9), 447–454 (2017)Google Scholar
  13. 13.
    Kumar, A., Singhal, A., Sheetlani, J.: Essential-replica for face detection in the large appearance variations. Int. J. Pure Appl. Math. 118(20), 2665–2674 (2018)Google Scholar
  14. 14.
    Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R., Shamsuddin, M.Z.I.: Information hiding using steganography. In: 2003 Proceedings of 4th National Conference on Telecommunication Technology, NCTT, pp. 21–25, 14–15 January 2003Google Scholar
  15. 15.
    Liu, T.-Y., Tsai, W.-H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007).  https://doi.org/10.1109/tifs.2006.890310CrossRefGoogle Scholar
  16. 16.
    Kumar, A., Vengatesan, K., Rajesh, M., Singhal, A.: Teaching literacy through animation & multimedia. Int. J. Innovative Technol. Exploring Eng. 8(5), 73–76 (2019)Google Scholar
  17. 17.
    Johnson, N.F., Suhil, J.: Exploring steganography: seeing the unseen. Computing practices (2006). http://www.jjtc.com/pub/r2026.pdf
  18. 18.
  19. 19.
    Stefan, S.: Steganographic Systems. CSC/MAT 494Google Scholar
  20. 20.
  21. 21.
    Shi, Z., Tu, J., Zhang, Q., Liu, L., Wei, J.: A survey of swarm robotics system. In: Advances in Swarm Intelligence. LNCS, vol. 7331 (2012)Google Scholar
  22. 22.
    Lau, H.K.: Error detection in swarm robotics: a focus on adaptivity to dynamic environments. Ph.D. Thesis. University of York, Department of Computer Science (2012)Google Scholar
  23. 23.
    Marco, D., et al.: The swarm-bot project. In: Swarm Robotics. LNCS, vol. 3342 (2005)Google Scholar
  24. 24.
    Selvaraj Kesavan, E., Kumar, S., Kumar, A., Vengatesan, K.: An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services. Int. J. Comput. Appl. (2019).  https://doi.org/10.1080/1206212X.2019.1575034CrossRefGoogle Scholar
  25. 25.
    Marco, D., et al.: Evolving self-organizing behaviors for a swarm-bot. Auton. Robots. 17(2–3), 223–245 (2004)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • K. Vengatesan
    • 1
    Email author
  • Abhishek Kumar
    • 2
  • Tusar Sanjay Subandh
    • 1
  • Rajiv Vincent
    • 3
  • Samee Sayyad
    • 4
  • Achintya Singhal
    • 2
  • Saiprasad Machhindra Wani
    • 1
  1. 1.Department of Computer EngineeringSanjivani College of EngineeringKopargaonIndia
  2. 2.Department of Computer ScienceBanaras Hindu UniversityVaranasiIndia
  3. 3.School of Computing Science and EngineeringVIT UniversityChennaiIndia
  4. 4.School of EngineeringSymbiosis Skill and Open UniversityPuneIndia

Personalised recommendations