A New Approach for Data Security in Cryptography and Steganography

  • Prashanti Guttikonda
  • Sandhya Rani Kaviti
  • Ashok Kumar Popuri
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)


This work deals with the combination of cryptography and steganography to handle the problems of information security. A new encryption algorithm is proposed based on matrix scrambling which uses arithmetic operations, random functions, circular shifting and exchanging operations to get the encrypted message. Further, security is enhanced by steganography method where the encrypted message is hidden in the image based on the gini index value. For each R G B component of the pixel, gini index is calculated and the component with least value will have the encrypted message. The proposed method provides dual security since the encrypted message is hidden at different positions of 4 LSB of image. Avalanche effect is used as the metric for analyzing the performance of the encryption algorithm.


Cryptography Steganography Information security Avalanche effect Gini index 


  1. 1.
    Kiran Kumar, M., Mukthyar Azam, S., Shaik Rasool: Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique. International Journal of Network Security & Its Applications. 2(4), 30–41 (2010).Google Scholar
  2. 2.
    Suli Wu, Yang Zhang, Xu Jing: A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue. In: IEEE International Conference on Computer Science and Software Engineering, vol.3, pp. 841–844 (2008).Google Scholar
  3. 3.
    HuLihong: Research on Improved Algorithm Based on Encryption Algorithm of Hill. In: IEEE International Conference on Computer Application and System Modeling, ICCASM, vol. 8, pp. 659–662 (2010).Google Scholar
  4. 4.
    Gurpreet Singh, Supriya: Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES. In: Proceedings of the 2nd International Conference on Advanced Computing, Networking and Security, IEEE Computer Society, pp. 232–237 (2013).Google Scholar
  5. 5.
    Dipesh Agrawal, Samidha Diwedi Sharma: Analysis of Random Bit Image Steganography Techniques. International Journal of Computer Applications. International Conference on Recent Trends in Engineering & Technology (2013).Google Scholar
  6. 6.
    Badrinath, R., Anand, P.S.: MSB Constrain Based Variable Embedding. In: Computing Communication & Networking Technologies (2012).Google Scholar
  7. 7.
    Manoj Kumar Ramaiya, Naveen Hemrajani, Anil Kishor Saxena: Security Improvisation in Image Steganography using DES. In: 3rd IEEE Trans. International Conference IACC, pp. 1094–1099 (2013).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Prashanti Guttikonda
    • 1
  • Sandhya Rani Kaviti
    • 1
  • Ashok Kumar Popuri
    • 2
    • 3
  1. 1.Vignan’s Lara Institute of Technology & ScienceGunturIndia
  2. 2.VFSTR UniversityGunturIndia
  3. 3.S.V.U. College of EngineeringS.V. UniversityTirupatiIndia

Personalised recommendations