Advertisement

A Data Security Scheme Using Image Steganography

  • Karthika C. NairEmail author
  • T. K. Ratheesh
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)

Abstract

This paper proposes a method for protecting data from unauthorized access with the use of both stenographic and cryptographic mechanisms. The system uses block pixel-value differencing (BPVD) and Advanced Encryption Standard (AES) for data protection. The original image is partitioned into 4 × 4 blocks and the data gets traversed in all the three directions and RGB channel. Based on the hiding capacity of each direction, the proposed method choose a color channel for embedding the encrypted data. AES method is used for encrypting the text data to be embedded. In this new hybrid method the concealing capacity of the image is improved as each direction obtain maximum data. As the data is encrypted, the security of the system is improved much. Using color images the concealing capacity of PVD method is identified and direction based analysis is provided in it.

Keywords

AES Cryptography PVD Steganography 

References

  1. 1.
    Chang, K.C., Chang, C.P., Huang, P.S., Tu, T.M.: A novel image steganographic method using tri-way pixel-value differencing. J. Multimed. 3(2), 37–44 (2008)Google Scholar
  2. 2.
    Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)CrossRefGoogle Scholar
  3. 3.
    Chen, J.: A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process. Image Commun. 29(3), 375–384 (2014)CrossRefGoogle Scholar
  4. 4.
    Borges, P.V.K., Mayer, J., Izquierdo, E.: Robust and transparent color modulation for text datahiding. IEEE Trans. Multimed. 10(8), 1479–1489 (2008)CrossRefGoogle Scholar
  5. 5.
    Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding optimal LSB substitution in image for hiding by dynamic programming strategy. Pattern Recogn. 36(7), 1583–1595 (2003)CrossRefGoogle Scholar
  6. 6.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)CrossRefGoogle Scholar
  7. 7.
    Swain, G.: Adaptive pixel value differencing steganography using both vertical and horizontal edges (2015).  https://doi.org/10.1007/s11042-015-2937-2CrossRefGoogle Scholar
  8. 8.
    Luo, W., Huang, F., Huang, J.: A more secure steganography based on adaptive pixel-value differencing scheme (2010).  https://doi.org/10.1007/s11042-009-0440-3CrossRefGoogle Scholar
  9. 9.
    Khodaei, M., Faez, K.: New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing (2011).  https://doi.org/10.1049/iet-ipr.2011.0059CrossRefGoogle Scholar
  10. 10.
    Mandal, J.K., Das, D.: Colour image steganography based on pixel value differencing in spatial domain (2012).  https://doi.org/10.5121/ijist.2012
  11. 11.
    Thinn, A.A., Thwin, M.M.S.: Modification of AES algorithm by using second key and modified SubBytes operation for text encryption (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of ITGEC IdukkiIdukkiIndia

Personalised recommendations