StegoCrypt: Combining steganography and cryptography

Yuan, Xi and Cai, Peng StegoCrypt: Combining steganography and cryptography., 2019 . In IEEE. (Submitted) [Conference paper]

[thumbnail of Conference-template-A4.pdf]
Preview
Text
Conference-template-A4.pdf

Download (423kB) | Preview

English abstract

The utilization of pictures to conceal data is a highlight which leaves little uncertainty in a watcher's psyche. Utilizing any medium to shroud data alludes to a strategy called steganography. When we utilize a picture as a medium then that technique is called picture steganography. The most renowned technique to now is the Least Significant Bit Algorithm (LSB). In that technique, the least critical piece of every pixel is taken and data is covered up in that. This anyway is effectively brittle. Consequently an option and increasingly secure arrangement is given. First the information is scrambled utilizing the Blowfish calculation. Next an inventive technique is displayed. This encoded square is broken down to 'n' littler squares and 'n' pictures are picked indiscriminately what's more, each picture is made to conceal a square of the encoded information. To keep up the right arrangement of hinders a hash table is kept up. This is then encoded utilizing LSB to another picture called the hashing picture. This hashing picture is sent alongside the 'n' different pictures. To separate the information out, first the hash picture is acquired and utilizing this the scrambled square is reassembled and after that unique information is gotten by unscrambling.The utilization of pictures to conceal data is a highlight which leaves little uncertainty in a watcher's psyche. Utilizing any medium to shroud data alludes to a strategy called steganography. When we utilize a picture as a medium then that technique is called picture steganography. The most renowned technique to now is the Least Significant Bit Algorithm (LSB). In that technique, the least critical piece of every pixel is taken and data is covered up in that. This anyway is effectively brittle. Consequently an option and increasingly secure arrangement is given. First the information is scrambled utilizing the Blowfish calculation. Next an inventive technique is displayed. This encoded square is broken down to 'n' littler squares and 'n' pictures are picked indiscriminately what's more, each picture is made to conceal a square of the encoded information. To keep up the right arrangement of hinders a hash table is kept up. This is then encoded utilizing LSB to another picture called the hashing picture. This hashing picture is sent alongside the 'n' different pictures. To separate the information out, first the hash picture is acquired and utilizing this the scrambled square is reassembled and after that unique information is gotten by unscrambling.

Item type: Conference paper
Keywords: steganography, cryptography
Subjects: A. Theoretical and general aspects of libraries and information.
Depositing user: Mr Eugene Fox
Date deposited: 09 Oct 2019 00:31
Last modified: 09 Oct 2019 00:31
URI: http://hdl.handle.net/10760/39047

References

[1] Gowda, S.N., 2016, September. Innovative enhancement of the Caesar cipher algorithm for cryptography. In 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Fall) (pp. 1-4). IEEE.

[2] Babu, K Ravindra, S U Kumar, and A V Babu. "A Survey on cryptography and Steganography methods for information security." International Journal of Computer Applications Volume 12 Issue 3 pp 13-17, December 2010.

[3] K Wu and C Wang, “Steganography using reversible texture synthesis” IEEE Transactions on Image Processing Vol.24 pp 130-139,January 2015.

[4] Gowda, S.N., 2016, October. Using Blowfish encryption to enhance security feature of an image. In 2016 6th International Conference on Information Communication and Management (ICICM) (pp. 126-129). IEEE.

[5] M T Parvez and A Gutub, “RGB Intensity Based Variablr-Bits Image Steganography”, IEEE Asia-Pacific Services Computing Conference, pp 1322-1326, December 2008.

[6] A Nag, S Biswas, D Sarkar, P P Sarkar “A novel technique for image steganography based on Block-DCT and Huffman Encoding” International Journal Of Computer Science and Information Technology, pp 103-112, vol 2, June 2010.

[7] Gowda, S.N. and Sulakhe, S., 2016, April. Block Based Least Significant Bit Algorithm For Image Steganography. In Annual Int'l Conference on Intelligent Computing, Computer Science & Information Systems (ICCSIS-16) (pp. 16-19).

[8] S Gupta , G Gujral and N Aggarwal "Enhanced Least Significant Bit algorithm For Image Steganography" IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 4, pp 40-42, July 2012.

[9] Gowda, S.N., 2016, July. Dual layered secure algorithm for image steganography. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (pp. 22-24). IEEE.

[10] Gowda, S.N., 2016, November. An advanced Diffie-Hellman approach to image steganography. In 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1-4). IEEE.

[11] M Bashardoost ,G B Sulongand, P Gerami "Enhanced LSB Image Steganography Method By Using Knight Tour Algorithm, Vigenere Encryption and LZW Compression" IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, pp. 221-227, March 2013.

[12] S Singh and T J Siddiqui "A Security Enhanced Robust Steganography Algorithm for Data Hiding" IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, pp 131-139, May 2012.

[13] Gowda, S.N., 2016, December. Advanced dual layered encryption for block based approach to image steganography. In 2016 International Conference on Computing, Analytics and Security Trends (CAST) (pp. 250-254). IEEE.

[14] Gowda, S.N. and Vrishabh, D.N., 2017, April. A secure trigonometry based cryptography algorithm. In 2017 International Conference on Communication and Signal Processing (ICCSP) (pp. 0106-0109). IEEE.

[15] Gowda, S.N., 2017, July. An intelligent fibonacci approach to image steganography. In 2017 IEEE Region 10 Symposium (TENSYMP) (pp. 1-4). IEEE.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item