Skip to main content

Multilevel Steganography for Data Protection

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 904))

Abstract

Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rabah, K.: Steganography-the art of hiding data. Inf. Technol. J. 3(3), 245–269 (2004)

    Article  MathSciNet  Google Scholar 

  2. Joseph, P., Vishnukumar, S.: A study on steganographic techniques. In: 2015 Global Conference on Communication Technologies (GCCT), pp. 206–210. IEEE, New York (2015)

    Google Scholar 

  3. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal process. 90(3), 727–752 (2010)

    Article  Google Scholar 

  4. Yi, G.: Notice of violation of ieee publication principles research on a novel MAS for automated negotiation method. In: 3rd International Conference on Intelligent System and Knowledge Engineering, 2008. ISKE 2008, vol. 1, pp. 635–639. IEEE, New York (2008)

    Google Scholar 

  5. Jassim, F.A.: A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642 (2013)

  6. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: An anti-SMS-spam using CAPTCHA. In: ISECS International Colloquium on Computing, Communication, Control, and Management, 2008. CCCM’08, vol. 2, pp. 318–321. IEEE, New York (2008)

    Google Scholar 

  7. Singh, A., Jauhari, U.: Data security by preprocessing the text with secret hiding. Adv. Comput. 3(3), 63 (2012)

    Google Scholar 

  8. Al-Afandy, K.A., Faragallah, O.S., ELmhalawy, A., El-Rabaie, E.-S M., El-Banby, G.M.: High security data hiding using image cropping and lsb least significant bit steganography. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400–404. IEEE, New York (2016)

    Google Scholar 

  9. Haney, J.D.: The use of cryptography to create data file security: with the rijndael cipher block. J. Comput. Sci. Colleges 21(3), 30–39 (2006)

    Google Scholar 

  10. [Online]. Available: http://www.facweb.iitkgp.ernet.in/sourav/DES.pdf

  11. Zhuoran, Z., Daolian, X., Yunyun, S., Jikun, D., Lei, X.: The LCD interface design based on pic16f877 and ra8835. Microcomput. Appl. 17, 010 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sourabh Tyagi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tyagi, S., Anurag, P., Pai, S.N. (2019). Multilevel Steganography for Data Protection. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5934-7_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5933-0

  • Online ISBN: 978-981-13-5934-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics