Abstract
Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rabah, K.: Steganography-the art of hiding data. Inf. Technol. J. 3(3), 245–269 (2004)
Joseph, P., Vishnukumar, S.: A study on steganographic techniques. In: 2015 Global Conference on Communication Technologies (GCCT), pp. 206–210. IEEE, New York (2015)
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal process. 90(3), 727–752 (2010)
Yi, G.: Notice of violation of ieee publication principles research on a novel MAS for automated negotiation method. In: 3rd International Conference on Intelligent System and Knowledge Engineering, 2008. ISKE 2008, vol. 1, pp. 635–639. IEEE, New York (2008)
Jassim, F.A.: A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642 (2013)
Shirali-Shahreza, M.H., Shirali-Shahreza, M.: An anti-SMS-spam using CAPTCHA. In: ISECS International Colloquium on Computing, Communication, Control, and Management, 2008. CCCM’08, vol. 2, pp. 318–321. IEEE, New York (2008)
Singh, A., Jauhari, U.: Data security by preprocessing the text with secret hiding. Adv. Comput. 3(3), 63 (2012)
Al-Afandy, K.A., Faragallah, O.S., ELmhalawy, A., El-Rabaie, E.-S M., El-Banby, G.M.: High security data hiding using image cropping and lsb least significant bit steganography. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400–404. IEEE, New York (2016)
Haney, J.D.: The use of cryptography to create data file security: with the rijndael cipher block. J. Comput. Sci. Colleges 21(3), 30–39 (2006)
[Online]. Available: http://www.facweb.iitkgp.ernet.in/sourav/DES.pdf
Zhuoran, Z., Daolian, X., Yunyun, S., Jikun, D., Lei, X.: The LCD interface design based on pic16f877 and ra8835. Microcomput. Appl. 17, 010 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tyagi, S., Anurag, P., Pai, S.N. (2019). Multilevel Steganography for Data Protection. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_41
Download citation
DOI: https://doi.org/10.1007/978-981-13-5934-7_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5933-0
Online ISBN: 978-981-13-5934-7
eBook Packages: EngineeringEngineering (R0)