Abstract
Information security is very important to authorize users for Internet-based system. Steganography is an approach to make communication secure in high-density space and maintained among respective users for hidden communication of secret information. Alternatively, unauthorized user cannot realize the existence of authorized communication. In this paper, a data hiding scheme is proposed using the parity checker in frequency domain. In time of inserting the secret message, the protection of steganographic communication is increased by parity checker from statistical attacks due to indirect occurrence of information in stego-image. In addition, this procedure develops the authentication between LSB matrix of DCT values of cover image and secret key. This scheme maintains all the conditions of information security with high concreteness during wireless communication among authenticated users. Efficiency of the scheme is analyzed from statistical attacks with the parameters such as Peak Signal-to-Noise Ratio, Mean Squared Error, Embedding capacity, and protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ali, T., Doegar, A.: A novel approach of LSB based steganography using parity checker. Int. J. Adv. Res. Comput. Sci. Software Eng. 5(1) (2015). ISSN: 2277 128X
Rajkumar, A., et al.: New steganography method for gray level images using parity checker. Int. J. Comput. Appl. 11(11) (2010)
Chatterjee, A., Das, A.K.: Secret communication combining cryptography and steganography. Paper presented at the 1st international conference on advanced computing and intelligent engineering, 21–23 Dec 2016, Bhubaneswar, India (2016)
Khamrui, A., Mandal, J.K.: A genetic algorithm based steganography using discrete cosine transformation (GASDCT). In: International Conference on Computational Intelligence: Modelling Techniques and Applications (CIMTA 2013), vol. 10, pp. 105–111. ELSEVIER, University of Kalyani, Kalyani, Procedia Technology (2013)
Wang, S., Wang, B., Niu, X.: A secure steganography method on genetic algorithm. J. Inf. Hiding Multimed. Signal Process 1(1), 28–35 (2010)
Nosrati, M., Karimi, R.: A survey on usage of genetic algorithms in recent steganography researches. World Appl Program. 2(03), 206–210 (2012)
Singla, D., Syal, R.: Data security using LSB & DCT steganography in images. Int. J. Comput. Eng. Res. (IJCER) 2(2), 359–364 (2012)
Pachghare, V.K.: Cryptography and Information Security. PHI Learning Private Limited, New Delhi (2011)
Walia, E., Jain, P.: An analysis of LSB & DCT based steganography. Glob. J. Comput. Sci. Technol. 10(01), 04–08 (2010)
Gokul, M., et al.: Hybrid steganography using visual cryptography and LSB encryption method. Int. J. Comput. Appl. 59, (14), 05–08 (2012)
Soleimanpour, M.: A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain. Iranian J. Electr. Electron. Eng. 09(02), 67–75 (2013)
Mishra, S., Bali, S.: Public cryptography using genetic algorithm. Int. J. Recent Technol. Eng. (IJRTE) 02(03), 150–154 (2013)
Mehndiratta, A.: Data hiding system using cryptography & steganography: a comprehensive modern investigation. Int. Res. J. Eng. Technol. 02(01), 397–403 2015
Zamani, M., et al.: A genetic-algorithm-based approach for audio steganography. Int. J. Comput. Electr. Autom. Control Inf. Eng. 03(06), 1562–1565 (2009)
Rajyaguru, M.H.: CRYSTOGRAPHY-combination of cryptography and steganography with rapidly changing keys. Int. J. Emerg. Technol. Adv. Eng. 02(10), 329–332 (2012)
Nehru, G., Dhar, P.: A detailed look of audio steganography techniques using LSB & genetic algorithm approach. Int.l J. Comput. Sci. (IJCSI) 09(01), 402–406 (2012)
Jain, R., Kumar, N.: Efficient data hiding scheme using lossless data compression and imege steganography. Int. J. Eng. Sci. Technol. (IJEST) 4(8), 3908–3915 (2012)
Diwesh, D., et al., AAKRITI (ed.): An image and data encryption-decryption tool. Int. J. Comput. Sci. Inf. Technol. Res. 03(02), 264–268 (2015)
Roy, S., Venkateswaran, P.: Online payment system using steganography and visual cryptography. In: Students Conference on Electrical, Electronics and Computer Science. IEEE (2014)
Lin, Y.-K.: A data hiding scheme based upon DCT coefficient modification. Sci. Direct Comput. Stand. Interfaces 36, 855–862 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chatterjee, A., Bera, T., Pati, S.K., Das, A.K. (2019). A Data Hiding Scheme with Digital Authentication Using Parity Checkers. In: Nayak, J., Abraham, A., Krishna, B., Chandra Sekhar, G., Das, A. (eds) Soft Computing in Data Analytics . Advances in Intelligent Systems and Computing, vol 758. Springer, Singapore. https://doi.org/10.1007/978-981-13-0514-6_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-0514-6_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0513-9
Online ISBN: 978-981-13-0514-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)