Modified LSB Method Using New Cryptographic Algorithm for Steganography

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 236)

Abstract

Steganography is different from Cryptography, Steganography is the process of hiding the information so that no one will try to decrypt the information, where as in Cryptography it is obvious that the message is encrypted, so that any one will try decrypting the message. In this paper, we are suggesting new methods to improve the security in data hiding, perhaps by combining steganography and cryptography. In this work, we propose a new encryption method that provides the cipher text as the same size of the plain text. We also presented an extensive classification of various steganographic methods that have used in the field of Data Security. We analyze both security and performance aspects of the proposed methods by PSNR values and proved that in the cryptographic point of view. The proposed method is feasible in such a way that it makes to intricate the steganalyst to retrieve the original information from the Stego-image even if he detect the presence of digital steganography. An embedded message in this method is perceptually indiscernible under normal observation and thus our proposed method achieves the imperceptibility. The volume of data or message to be embedded in this method is comparatively large and proved in Experimental Results hence the high capacity is also achieved.

Keywords

Encryption Steganography Data hiding Cryptography 

Notes

Acknowledgments

We would like to express our gratitude to Velammal Engineering College in which where I am working, for providing to access all the resources . I would like to acknowledge Ms. Mary Elizabeth for her great support.

References

  1. 1.
    Challita, K., Farhat, H.: Combining steganography and cryptography: new directions. In: IJCNAA 1(1), 199–208 (2012). The Society of Digital Information and Wireless CommunicationGoogle Scholar
  2. 2.
    Walia, E., Jain, P., Navdeep.: An analysis of LSB & DCT based steganography. Glob. J. Comput. Sci. Technol. 10(1), 4–8 (2010)Google Scholar
  3. 3.
    Socek, D., Kalva, H., Magliveras, S.S, Marques, O., Culibrk, D., Furht, B.: New approaches to encryption and steganography for digital videos. Multimedia Syst. 13(3), 191–204 (2007). (Springer)Google Scholar
  4. 4.
    Bandyopadhyay, S.K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., Das: A tutorial review of steganography. In: IC3, pp. 105–114 (2008)Google Scholar
  5. 5.
    Dunbar B.: A detailed look at Steganographic techniques and their use in an open systems environment. Sans Institute InfoSec Reading Room (2002)Google Scholar
  6. 6.
    Katzenbeisser, S., Peticolas, F.A.P.: Information hiding techniques for steganography and watermarking. Artech House, Boston (2000)Google Scholar
  7. 7.
    Upham, D.: Steganographic algorithm JSteg. http://zooid.org/paul/crpto/jsteg
  8. 8.
    Zahedi Kermani, M.J.Z.: A roust steganography algorithm based on texture similarity using gabor filter. In: IEEE 5th International Symposium on Signal Processing and Information Technology (2005)Google Scholar
  9. 9.
    Fridrich, J., Goljan, M.: Detecting LSB steganography in color and grey scale images. IEEE Multimedia Secur 8, 22–28 (2001)Google Scholar
  10. 10.
    Ashourian, M., Jain, R.C., Ho, Y.-S.:Dithered quantization for image data hiding in the DCT domain. In: Proceeding of IST, pp. 171–175 (2003)Google Scholar
  11. 11.
    Krenn, J.R.: Steganography and Steganalysis, January 2004Google Scholar
  12. 12.
    Hwang, R.-J., Shih, T.K., Kao, C.-H.: A lossy compression tolerant data hiding method based on JPEG and VQ. J. Internet Technol. 5, 171–178 (2004)Google Scholar
  13. 13.
    Tseng, H.-W., Chang, C.-C.: High capacity data hiding in JPEG compressed images. Informatica, 15, 127–142 (2004)Google Scholar
  14. 14.
    Park, Y., Kang, H., Yamaguchi, K., Kobayashi, K.: Integrity verification of secret information in image steganography. In: Symposium on Information Theory and its Applications. Hakodate, Hokkaido, Japan (2006)Google Scholar
  15. 15.
    Neeta, D., Snehal, K., Jacobs, D.: Implementation of LSB steganography and its evaluation for various bits. In: 2006 1st International Conference on Digital Information Management on 6 Jan 2007. doi:  10.11.09/ICDIM.2007.369349 (2007)
  16. 16.
    Jain, A., Gupta, I.S.: A JPEG compression resistant steganography scheme for raster graphics images. In: IEEE Region 10 Conference TENCON 2007, vol. 2 (2007)Google Scholar
  17. 17.
    Furht, B., Muharemagic, E.A., Socek, D.: Multimedia security: encryption and watermarking. Multimedia Systems and Applications, vol. 28. Springer, Berlin (2005)Google Scholar
  18. 18.
    Li, S., Chen, G., Zheng, X.: Chaos-based encryption for digital images and videos. In: Furht, B., Kirovski, D (eds.) Multimedia Security Handbook. Internet and Communications Series, vol. 4, pp. 133–167. CRC Press, West Palm Beach (2004)Google Scholar
  19. 19.
    Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real Time Imaging VI, Proceedings of SPIE, vol. 4666, pp. 149–160. SPIE Publishers (2002)Google Scholar
  20. 20.
    Uhl, A., Pommer, A.: Image and video encryption: from digital rights management to secured personal communication. In: Advances in Information Security, vol. 15. Springer, New York (2005)Google Scholar
  21. 21.
    Esra S., Hakan I.: A compression-based text steganography method (2012). doi:  10.1016/j.jss.2012.05.027

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Research ScholarManonmaniam Sundaranar UniversityTirunelveliIndia
  2. 2.Department of ITVelammal Engineering CollegeChennaiIndia
  3. 3.Research DirectorSt. Xavier CollegePalyamkottaiIndia

Personalised recommendations