Securing Data in Images Using Cryptography and Steganography Algorithms

Authors

  • Pooja Bagane Department of Computer Science, Symbiosis Institute of Technology, (SIT) affiliated to Symbiosis International (Deemed University), Pune, India
  • S. Venkatesh Assistant Professor, Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology kattankulathur, Chennai
  • John Babu Guttikonda Professor & Principal, Department of CSE, Vijaya Engineering College, Tanikella, Khammam – 507305, Telangana
  • Arti Badhoutiya Department of Electrical Engineering, GLA University, Mathura
  • Arun Pratap Srivastava Lloyd Institute of Engineering & Technology, Greater Noida
  • Akhilesh Kumar Khan Lloyd Law College, Greater Noida
  • A. Deepak Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamilnadu
  • Anurag Shrivastava Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, Tamilnadu

Keywords:

Cryptography, Steganography, Vigenère Cipher, Hash based LSB, Encryption, Decryption, Embedding process

Abstract

In today’s world, there has been a tremendous increase in the usage of the internet and different kinds of networks to transfer data from one place to another with accuracy and speed. With this rapid growth of the internet and increase in digitalisation, we have entered a time where colossal amounts of data that are transferred via the networks are at constant risk. Transference of data across insecure pathways puts the security of the data in jeopardy. Cryptography and Steganography are two of the many methods that help secure data and protect it from being accessible to intruders or third parties while transmitting it over an open channel or any network. In this paper, a Hash Least Significant Bit (H-LSB) along with Vigenère cipher algorithm has been proposed for providing additional security to data. The paper proposes a system which uses a multi-layer security technique using cryptography and steganography that aims to enhance data security, making it safe and more secure to transfer across open channels or other networks. 

Downloads

Download data is not yet available.

References

M. Mukhedkar, P. Powar and P. Gaikwad, "Secure non real time image encryption algorithm development using cryptography & steganography," 2015 Annual IEEE India Conference (INDICON), 2015, pp. 1-6, doi: 10.1109/INDICON.2015.7443808.

S. Bukhari, M. S. Arif, M. R. Anjum and S. Dilbar, "Enhancing security of images by Steganography and Cryptography techniques," 2016 Sixth International Conference on Innovative Computing Technology (INTECH), 2016, pp. 531-534, doi: 10.1109/INTECH.2016.7845050.

M. Dahiya and R. Kumar, "A Literature Survey on various Image Encryption & Steganography Techniques," 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 2018, pp. 310-314, doi: 10.1109/ICSCCC.2018.8703368.

Jui-Cheng and Jiun-In Guo, "A new chaotic key-based design for image encryption and decryption," 2000 IEEE International Symposium on Circuits and Systems (ISCAS), 2000, pp. 49-52 vol.4, doi: 10.1109/ISCAS.2000.858685.

R. I. Masya, R. F. Aji and S. Yazid, "Comparison of Vigenere Cipher and Affine Cipher in Three-pass Protocol for Securing Image," 2020 6th International Conference on Science and Technology (ICST), 2020, pp. 1-5, doi: 10.1109/ICST50505.2020.9732873.

L. Voleti, R. M. Balajee, S. K. Vallepu, K. Bayoju and D. Srinivas, "A Secure Image Steganography Using Improved Lsb Technique And Vigenere Cipher Algorithm," 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 2021, pp. 1005-1010, doi: 10.1109/ICAIS50930.2021.9395794.

Bhatt Santhosi, Ray Arghya, Ghosh Avishake, Ray Ananya, “Image Steganography and Visible Watermarking using LSB Extraction Technique”, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO), 2015.

Karim Masud S.M, Rahman Saifur Md, Hossain Ismail md, “A New Approach for LSB Based Image Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I) 22-24 December, 2011, Dhaka, Bangladesh.

Thangadurai K, Devi Sudha G , “An analysis of LSB Based Image Steganography Techniques”, International Conference on Computer Communication and Informatics (ICCCI -2014),Jan. 03 – 05, 2014.

Jain Mamta, Lenka Kumar Saroj, “Digital Image Steganography using RGB Color Model: A Review”, International Journal of Applied Engineering Research (IJAER).

Kavita Kadam, Ashwini Koshti and Priya Dunghav.” Steganography Using Least Significant Bit Algorithm”, Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun (2012): 338-341

Kousik Dasgupta , J.K. Mandal and Paramartha Dutta.” Hash Based Least Significant Bit Technique For Video Steganography(HLSB)”, International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 2, April (2012):1-11.

Neil F. Johnson and Sushil Jajodia.” Exploring Steganography: Seeing the Unseen”, IEEE Computer, Vol. 31, Issue No. 2, Feb. (1998): 26-34.

Ekta Walia , Payal Jain and Navdeep.” An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, Vol. 10 Issue 1, April (2010):4-8.

Roza Hikmat Hama Aziz.”Improving Courier Service Reservation System: Reliability and Performance”, Asia Journal of Natural & Applied Sciences, Vol. 4 (4), December (2015): 20-36.

P, Kumar and V, Sharma.” Information Security Based on Steganography & Cryptography Techniques: A Review”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 10, October (2014):247-250.

A, Anagaw and V. Sreenivasarao.” A Modified RSA Encryption Technique Based on Multiple public keys”. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, June (2013):859-864

Shrivastava, A., Chakkaravarthy, M., Shah, M.A..A Novel Approach Using Learning Algorithm for Parkinson’s Disease Detection with Handwritten Sketches. In Cybernetics and Systems, 2022

Shrivastava, A., Chakkaravarthy, M., Shah, M.A., A new machine learning method for predicting systolic and diastolic blood pressure using clinical characteristics. In Healthcare Analytics, 2023, 4, 100219

Shrivastava, A., Chakkaravarthy, M., Shah, M.A.,Health Monitoring based Cognitive IoT using Fast Machine Learning Technique. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 720–729

Shrivastava, A., Rajput, N., Rajesh, P., Swarnalatha, S.R., IoT-Based Label Distribution Learning Mechanism for Autism Spectrum Disorder for Healthcare Application. In Practical Artificial Intelligence for Internet of Medical Things: Emerging Trends, Issues, and Challenges, 2023, pp. 305–321

Boina, R., Ganage, D., Chincholkar, Y.D., .Chinthamu, N., Shrivastava, A., Enhancing Intelligence Diagnostic Accuracy Based on Machine Learning Disease Classification. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 765–774

Shrivastava, A., Pundir, S., Sharma, A., ...Kumar, R., Khan, A.K. Control of A Virtual System with Hand Gestures. In Proceedings - 2023 3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023, 2023, pp. 1716–1721

R, Poornima and Iswarya R.J. "An Overview of Digital Image Steganography''. International Journal of Computer Science & Engineering Survey 4.1 (2013): 23- 31.

Rashid, Aqsa, Malik Missen, and Nadeem Salamat. "Analysis Of Steganography Techniques Using Least Significant Bit In Grayscale Images And Its Extension To Colour Images" Journal of Scientific Research & Reports (JSRR) 9.3 (2016): 1-14.

Nameer N. EL-Emam.” Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm”. International Journal of Computer, Electrical, Automation, Control and Information Engineering. Vol:2, No:11, (2008):3806- 3817.

S. E. El-Khamy, N. O. Korany and A. G. Mohamed, "A New Fuzzy-DNA Image Encryption and Steganography Technique," in IEEE Access, vol. 8, pp. 148935-148951, 2020, doi: 10.1109/ACCESS.2020.3015687.

Ako Muhammad Abdullah, Roza Hikmat Hama Aziz. "New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm " International Journal of Computer Applications (0975 – 8887) Volume 143 – No.4, June 2016

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt. “Digital image steganography: Survey and analysis of current methods” ScienceDirect, September 2009

Aized Amin Soofi, Irfan Riaz, Umair Rasheed. “An Enhanced Vigenere Cipher For Data Security” International Journal Of Scientific & Technology Research Volume 5, Issue 03, March 2016

Downloads

Published

07.02.2024

How to Cite

Bagane, P. ., Venkatesh, S. ., Guttikonda, J. B. ., Badhoutiya, A. ., Srivastava, A. P. ., Khan, A. K. ., Deepak, A. ., & Shrivastava, A. . (2024). Securing Data in Images Using Cryptography and Steganography Algorithms. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 17–25. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4705

Issue

Section

Research Article

Most read articles by the same author(s)

1 2 3 4 5 > >>